Security of the Multiple-Key Blom's Key Agreement Scheme for Sensor Networks

被引:0
|
作者
Yang, Mee Loong [1 ]
Al Anbuky, Adnan [2 ]
Liu, William [1 ]
机构
[1] Auckland Univ Technol, Sch Comp & Math Sci, Auckland, New Zealand
[2] Auckland Univ Technol, Sch Engn, Auckland, New Zealand
来源
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014 | 2014年 / 428卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of the Multiple-Key Blom's (MKB) key agreement scheme is analysed. We considered how the scheme may be broken by a very powerful and well resourced adversary who is able to capture any number of nodes to extract all the sensitive keying material. We showed that by choosing suitable keying parameters, the captured private keys cannot be used directly to break the scheme. Each captured key must first be correctly associated with the public key and master key used to compute it. The chances of finding this private-public-master-key association (PPMka) can be made extremely small and would require the attacker to capture a very large number of nodes, or try an extremely large number of possible solutions. This allows the scheme to be secure for use in large networks, overcoming the limitations in the original Blom's scheme. We obtained some analytical results and compared them to those from computer simulated attacks on the scheme.
引用
收藏
页码:66 / 79
页数:14
相关论文
共 50 条
  • [41] Identity - Based Multiple Key Agreement Scheme
    Dehkordi, Massoud Hadian
    Alimoradi, Reza
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (12): : 2392 - 2402
  • [42] Enhanced Security for the Modified Authenticated Key Agreement Scheme
    Kim, Minho
    Koc, Cetin Kaya
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (7B): : 164 - 169
  • [43] Provably secure user authentication and key agreement scheme for wireless sensor networks
    Das, Ashok Kumar
    Kumari, Saru
    Odelu, Vanga
    Li, Xiong
    Wu, Fan
    Huang, Xinyi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3670 - 3687
  • [44] A Dynamic User Authentication and Key Agreement Scheme for Heterogeneous Wireless Sensor Networks
    Chin-Chen Chang
    Wei-Yuan Hsueh
    Ting-Fang Cheng
    Wireless Personal Communications, 2016, 89 : 447 - 465
  • [45] Enhanced Security Certificateless Key Agreement Scheme Design
    Li, Na
    Dong, Yun-wei
    Zhang, Yu-Chen
    Che, Tian-Wei
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (12): : 77 - 84
  • [46] An attack on the Zhou-Fan-Li authenticated multiple-key agreement protocol
    Zhong, Sheng
    CRYPTOLOGIA, 2007, 31 (04) : 324 - 325
  • [47] New Key Agreement Techniques for Sensor Networks
    Parakh, Abhishek
    Kak, Subhash
    INFOCOMMUNICATIONS JOURNAL, 2015, 7 (01): : 15 - 21
  • [48] Lightweight Key Agreement for Wireless Sensor Networks
    Mesit, Jaruwan
    Brust, Matthias R.
    Bouvry, Pascal
    2018 IEEE 18TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2018, : 432 - 437
  • [49] A Key Pre-distribution Scheme Based on Multiple Key Spaces in Wireless Sensor Networks
    Wang, Yuying
    Qin, Zhongyuan
    Zhang, Qunfang
    Wang, Hengkang
    Huang, Jie
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 652 - 656
  • [50] An Identity and Attribute-based Key Agreement Scheme for Wireless Sensor and Actor Networks
    Fu, Xiaojing
    Zhang, Guoyin
    Ma, Chunguang
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,