Security of the Multiple-Key Blom's Key Agreement Scheme for Sensor Networks

被引:0
|
作者
Yang, Mee Loong [1 ]
Al Anbuky, Adnan [2 ]
Liu, William [1 ]
机构
[1] Auckland Univ Technol, Sch Comp & Math Sci, Auckland, New Zealand
[2] Auckland Univ Technol, Sch Engn, Auckland, New Zealand
来源
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014 | 2014年 / 428卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of the Multiple-Key Blom's (MKB) key agreement scheme is analysed. We considered how the scheme may be broken by a very powerful and well resourced adversary who is able to capture any number of nodes to extract all the sensitive keying material. We showed that by choosing suitable keying parameters, the captured private keys cannot be used directly to break the scheme. Each captured key must first be correctly associated with the public key and master key used to compute it. The chances of finding this private-public-master-key association (PPMka) can be made extremely small and would require the attacker to capture a very large number of nodes, or try an extremely large number of possible solutions. This allows the scheme to be secure for use in large networks, overcoming the limitations in the original Blom's scheme. We obtained some analytical results and compared them to those from computer simulated attacks on the scheme.
引用
收藏
页码:66 / 79
页数:14
相关论文
共 50 条
  • [21] An Impersonating-Resilient Key Agreement Scheme for Wireless Sensor Networks
    Yang, Lijun
    Ding, Chao
    Wu, Meng
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY II, PTS 1-4, 2013, 411-414 : 135 - 140
  • [22] A Key Agreement Scheme for Avionics Communications Security
    Li, Zheng
    2012 IEEE/AIAA 31ST DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2012,
  • [23] A user authentication and key agreement scheme for heterogeneous wireless sensor networks
    Yan L.-L.
    Chang Y.
    Zhang S.-B.
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2017, 46 (01): : 55 - 60
  • [24] Revisiting the Blom Key Management Scheme
    Gupta, Ankit
    Ahlawat, Priyanka
    2014 IEEE STUDENTS' CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER SCIENCE (SCEECS), 2014,
  • [25] AN ENCODING MULTIPLE-KEY RESPONSE UNIT
    CORWIN, TR
    BEATY, WJ
    BEHAVIOR RESEARCH METHODS INSTRUMENTS & COMPUTERS, 1985, 17 (04): : 474 - 475
  • [26] An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks
    Li, Chun-Ta
    Weng, Chi-Yao
    Lee, Cheng-Chi
    SENSORS, 2013, 13 (08): : 9589 - 9603
  • [27] ID-based authenticated multiple-key agreement protocol from pairings
    Kim, KW
    Ryu, EK
    Yoo, KY
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 4, 2004, 3046 : 672 - 680
  • [28] Improved Quantum Key Distribution Networks Based on Blom-Scheme
    Song, Ya-Qi
    Yang, Li
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT II, 2018, 255 : 251 - 270
  • [29] Mobility Based Key Management Security Scheme for Wireless Sensor Networks
    Lalitha, T.
    Jayaprabha, S.
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 87 (02) : 349 - 367
  • [30] A group key agreement scheme for QKD networks
    Su, Jin-Hai, 1600, Shanghai Jiaotong University (48):