Secure Path Key Establishment Schemes Based on Random Key Management for WSN

被引:2
作者
Ahlawat, Priyanka [1 ]
Dave, Mayank [1 ]
机构
[1] Natl Inst Technol, Dept Comp Engn, Kurukshetra, Haryana, India
关键词
Node capture attack; q-Composite scheme; Path key establishment; Random key predistribution scheme; FINDING DISJOINT PATHS; NODE CAPTURE ATTACK; DISTRIBUTED ALGORITHM; SENSOR; PREDISTRIBUTION; EFFICIENT;
D O I
10.1007/s40010-020-00675-z
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
A large number of the path key establishment schemes regard same probability of the node capture attack for each node in the wireless sensor networks. However, in certain critical applications this statement may not be right making such schemes less practical for many real-world applications like border surveillance and disaster management. In this paper, an attack matrix (AM) is designed to calculate the attack coefficient of the sensor nodes at the time of their positioning in the sensor field. The path key exposure problem is minimized by bypassing the nodes with greatest value of attack coefficient. Three attack-resistant path key establishment schemes are presented based on the AM namely attack-resistant proxy-based path key establishment, attack-resistant friend-based path key establishment and attack-resistant disjoint path key establishment. We find that the proposed schemes show improved performance compared to the existing path key establishment schemes. The resistance against node capture of proposed schemes has been verified based on the probability of key recovery and path compromise ratio. The result outcomes prove their expediency in diminishing node capture impact.
引用
收藏
页码:555 / 567
页数:13
相关论文
共 50 条
  • [31] A Key Distribution Scheme for WSN Based on Hash Chains and Deployment Knowledge
    You, Lin
    Yuan, Younan
    Yu, Wangke
    Wang, Qiuhua
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [32] Combating key-swapping collusion attack on random pairwise key pre-distribution schemes for wireless sensor networks
    Dai Thanh Tran
    Agbinya, Johnson I.
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (02) : 109 - 121
  • [33] A Key Management and Vulnerable area Detection scheme for Secure Pervasive Environments
    Oh, Hayoung
    Chae, Kijoon
    THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 1107 - +
  • [34] Design of Secure Authenticated Key Management Protocol for Cloud Computing Environments
    Li, Wei
    Li, Xuelian
    Gao, Juntao
    Wang, Haiyu
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1276 - 1290
  • [35] Survey on Certificateless Key Management Schemes in Mobile Ad Hoc Networks
    Liu, Qi
    Bai, Xiangyu
    PROCEEDINGS OF 2017 IEEE 7TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC), 2017, : 334 - 339
  • [36] A Random Key Management Scheme for Heterogeneous Wireless Sensor Network
    Zhu, Lina
    Zhang, Zuochang
    2015 INTERNATIONAL CONFERENCE ON CYBER SECURITY OF SMART CITIES, INDUSTRIAL CONTROL AND COMMUNICATIONS (SSIC), 2015,
  • [37] A Scalable and Secure Group Key Management Method for Secure V2V Communication
    Aliev, Hayotjon
    Kim, HyungWon
    Choi, Sunghyun
    SENSORS, 2020, 20 (21) : 1 - 31
  • [38] A secure authentication and key agreement scheme with dynamic management for vehicular networks
    Zhou, Yuxiang
    Tan, Haowen
    Iroshan, Karunarathina Chandrathilaka Appuhamilage Asiria
    CONNECTION SCIENCE, 2023, 35 (01)
  • [39] BlocKP: Key-Predistribution-Based Secure Data Transfer
    Gharib, Mohammed
    Owfi, Ali
    Afghah, Fatemeh
    Bentley, Elizabeth Serena
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (05) : 3851 - 3863
  • [40] A Secure Scheme Based on One-Way Associated Key Management Model in Wireless Sensor Networks
    Li, Sujun
    Zhou, Boqing
    Hu, Qinqin
    Wang, Jianxin
    Dai, Jingguo
    Wang, Weiping
    Yuan, Huiyong
    Cheng, Yun
    Wu, Jie
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (04) : 2920 - 2930