Secure Path Key Establishment Schemes Based on Random Key Management for WSN

被引:2
|
作者
Ahlawat, Priyanka [1 ]
Dave, Mayank [1 ]
机构
[1] Natl Inst Technol, Dept Comp Engn, Kurukshetra, Haryana, India
关键词
Node capture attack; q-Composite scheme; Path key establishment; Random key predistribution scheme; FINDING DISJOINT PATHS; NODE CAPTURE ATTACK; DISTRIBUTED ALGORITHM; SENSOR; PREDISTRIBUTION; EFFICIENT;
D O I
10.1007/s40010-020-00675-z
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
A large number of the path key establishment schemes regard same probability of the node capture attack for each node in the wireless sensor networks. However, in certain critical applications this statement may not be right making such schemes less practical for many real-world applications like border surveillance and disaster management. In this paper, an attack matrix (AM) is designed to calculate the attack coefficient of the sensor nodes at the time of their positioning in the sensor field. The path key exposure problem is minimized by bypassing the nodes with greatest value of attack coefficient. Three attack-resistant path key establishment schemes are presented based on the AM namely attack-resistant proxy-based path key establishment, attack-resistant friend-based path key establishment and attack-resistant disjoint path key establishment. We find that the proposed schemes show improved performance compared to the existing path key establishment schemes. The resistance against node capture of proposed schemes has been verified based on the probability of key recovery and path compromise ratio. The result outcomes prove their expediency in diminishing node capture impact.
引用
收藏
页码:555 / 567
页数:13
相关论文
共 50 条
  • [21] A Taxonomy of Key Management Schemes of Wireless Sensor Networks
    Vamsi, P. Raghu
    Kant, Krishna
    2015 5TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION TECHNOLOGIES ACCT 2015, 2015, : 690 - 696
  • [22] Pair-wise path key establishment in wireless sensor networks
    Sheu, Jang-Ping
    Cheng, Jui-Che
    COMPUTER COMMUNICATIONS, 2007, 30 (11-12) : 2365 - 2374
  • [23] RANDOM KEY PRE-DISTRIBUTION SCHEME BASED ON KEY UPDATING
    Zhu Ling-Zhi
    He Rui
    Zhang Jun-Ling
    INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2016, 9 (02) : 979 - 996
  • [24] Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach
    Huang, Dijiang
    Medhi, Deep
    ACM TRANSACTIONS ON SENSOR NETWORKS, 2007, 3 (03)
  • [25] Ruzicka Indexed Regressive Homomorphic Ephemeral Key Benaloh Cryptography for Secure Data Aggregation in WSN
    Pichumani, Saravanakumar
    Sundararajan, T. V. P.
    Dhanaraj, Rajesh Kumar
    Nam, Yunyoung
    Kadry, Seifedine
    JOURNAL OF INTERNET TECHNOLOGY, 2021, 22 (06): : 1287 - 1297
  • [26] A key management architecture and protocols for secure smart grid communications
    Long, Xuelian
    Tipper, David
    Qian, Yi
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3602 - 3617
  • [27] A WSN Layer-Cluster Key Management Scheme Based on Quadratic Polynomial and Lagrange Interpolation Polynomial
    Wang, Xiaogang
    Yang, Zhongfan
    Feng, Zhiqiang
    Zhao, Jun
    SENSORS, 2020, 20 (16) : 1 - 36
  • [28] Secure Collaborative Key Management for Dynamic Groups in Mobile Networks
    Kang, Sukin
    Ji, Cheongmin
    Hong, Manpyo
    JOURNAL OF APPLIED MATHEMATICS, 2014,
  • [29] Host mobility key management in dynamic secure group communication
    Daghighi, Babak
    Kiah, Miss Laiha Mat
    Iqbal, Salman
    Rehman, Muhammad Habib Ur
    Martin, Keith
    WIRELESS NETWORKS, 2018, 24 (08) : 3009 - 3027
  • [30] k-Connectivity in Random Graphs induced by Pairwise Key Predistribution Schemes
    Sood, Mansi
    Yagan, Osman
    2020 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2020, : 1343 - 1348