A Continuous Secure Scheme in Static Heterogeneous Sensor Networks

被引:6
作者
Zhou, Boqing [1 ,2 ]
Wang, Jianxin [1 ,2 ]
Li, Sujun [2 ]
Cheng, Yun [2 ]
Wu, Jie [3 ]
机构
[1] Cent South Univ, Sch Informat Sci & Engn, Changsha 410083, Hunan, Peoples R China
[2] Hunan Univ Humanities Sci & Technol, Dept Informat Sci & Engn, Loudi 417000, Hunan, Peoples R China
[3] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
Geterogeneous sensor network; two-dimensional backward key chain; pairwise key; KEY MANAGEMENT SCHEME; EFFICIENT;
D O I
10.1109/LCOMM.2013.072813.130834
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In heterogeneous sensor networks (HSNs), which use existing key predistribution schemes, network security will significantly decline with time. In this paper, a continuous secure scheme is proposed based on two-dimensional backward key chains. In the scheme, powerful sensors do not need to be equipped with tamper-resistant hardware. Analysis and simulations indicate that the proposed scheme can significantly improve the performance of existing schemes in resilience against node capture attacks throughout the lifecycle of static HSNs.
引用
收藏
页码:1868 / 1871
页数:4
相关论文
共 13 条
  • [1] Anderson R, 1996, PROCEEDINGS OF THE SECOND USENIX WORKSHOP ON ELECTRONIC COMMERCE, P1
  • [2] [Anonymous], LECT NOTES COMPUTER
  • [3] Random key predistribution schemes for sensor networks
    Chan, HW
    Perrig, A
    Song, D
    [J]. 2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 197 - 213
  • [4] An improved key distribution mechanism for large-scale hierarchical wireless sensor networks
    Cheng, Yi
    Agrawal, Dharma P.
    [J]. AD HOC NETWORKS, 2007, 5 (01) : 35 - 48
  • [5] Maintaining differentiated coverage in heterogeneous sensor networks
    Du X.
    Lin F.
    [J]. EURASIP Journal on Wireless Communications and Networking, 2005 (4) : 565 - 572
  • [6] An effective key management scheme for heterogeneous sensor networks
    Du, Xiaojiang
    Xiao, Yang
    Guizani, Mohsen
    Chen, Hslao-Hwa
    [J]. AD HOC NETWORKS, 2007, 5 (01) : 24 - 34
  • [7] ESCHENAUER L, 2002, ACM CCS 02 P NOV, P243
  • [8] A Secure Scheme of Continuity Based on Two-Dimensional Backward Hash Key Chains for Sensor Networks
    Li, Sujun
    Zhou, Boqing
    Dai, Jingguo
    Sun, Xingming
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2012, 1 (05) : 416 - 419
  • [9] A framework for a distributed key management scheme in heterogeneous wireless sensor networks
    Lu, Kejie
    Qian, Yi
    Guizani, Mohsen
    Chen, Hsiao-Hwa
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (02) : 639 - 647
  • [10] Piotrowski K., P 2006 ACM SASN