Security of the Multiple-Key Blom's Key Agreement Scheme for Sensor Networks

被引:0
|
作者
Yang, Mee Loong [1 ]
Al Anbuky, Adnan [2 ]
Liu, William [1 ]
机构
[1] Auckland Univ Technol, Sch Comp & Math Sci, Auckland, New Zealand
[2] Auckland Univ Technol, Sch Engn, Auckland, New Zealand
来源
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014 | 2014年 / 428卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of the Multiple-Key Blom's (MKB) key agreement scheme is analysed. We considered how the scheme may be broken by a very powerful and well resourced adversary who is able to capture any number of nodes to extract all the sensitive keying material. We showed that by choosing suitable keying parameters, the captured private keys cannot be used directly to break the scheme. Each captured key must first be correctly associated with the public key and master key used to compute it. The chances of finding this private-public-master-key association (PPMka) can be made extremely small and would require the attacker to capture a very large number of nodes, or try an extremely large number of possible solutions. This allows the scheme to be secure for use in large networks, overcoming the limitations in the original Blom's scheme. We obtained some analytical results and compared them to those from computer simulated attacks on the scheme.
引用
收藏
页码:66 / 79
页数:14
相关论文
共 50 条
  • [31] Security management in wireless sensor networks with a public key based scheme
    Pathan, Al-Sakib Khan
    Ryu, Jae Hyun
    Haque, Md. Mokammel
    Hong, Choong Seon
    MANAGING NEXT GENERATION NETWORKS AND SERVICES, PROCEEDINGS, 2007, 4773 : 503 - +
  • [32] A key management scheme with encoding and improved security for wireless sensor networks
    Pathan, Al-Sakib Khan
    Dai, Tran Thanh
    Hong, Choong Seon
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2006, 4317 : 102 - +
  • [33] AN IDENTITY-BASED KEY AGREEMENT SCHEME FOR LARGE SCALE SENSOR NETWORKS
    Yang Lijun
    Wu Meng
    Ding Chao
    JournalofElectronics(China), 2013, 30 (06) : 574 - 586
  • [34] Mobility Based Key Management Security Scheme for Wireless Sensor Networks
    T. Lalitha
    S. Jayaprabha
    Wireless Personal Communications, 2016, 87 : 349 - 367
  • [35] Quality of security through triple key scheme in wireless sensor networks
    Zia, Tanveer A.
    Zomaya, Albert Y.
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2010, 10 (05) : 722 - 732
  • [36] An identity-based authenticated key agreement scheme for heterogeneous sensor networks
    Fu, Xiaojing
    Zhang, Guoyin
    Ma, Chunguang
    Wuhan Daxue Xuebao (Xinxi Kexue Ban)/ Geomatics and Information Science of Wuhan University, 2010, 35 (05): : 582 - 586
  • [37] A secure key agreement scheme in low-energy wireless sensor networks
    Kim, Taeyeon
    Wang, Gicheol
    Cho, Gihwan
    EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, 4096 : 79 - 88
  • [38] AMAKA: Anonymous Mutually Authenticated Key Agreement Scheme for Wireless Sensor Networks
    Malik, Monica
    Gandhi, Khushi
    Narwal, Bhawna
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (01)
  • [39] On the design of a secure user authentication and key agreement scheme for wireless sensor networks
    Kumari, Saru
    Das, Ashok Kumar
    Wazid, Mohammad
    Li, Xiong
    Wu, Fan
    Choo, Kim-Kwang Raymond
    Khan, Muhammad Khurram
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23)
  • [40] A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks
    Chang, Chin-Chen
    Hsueh, Wei-Yuan
    Cheng, Ting-Fang
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 89 (02) : 447 - 465