Key Predistribution Approach in Wireless Sensor Networks Using LU Matrix

被引:22
作者
Dai, Hangyang [1 ]
Xu, Hongbing [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Automat Engn, Chengdu 610054, Peoples R China
关键词
LU matrix-based; polynomial-based key predistribution; security; wireless sensor works;
D O I
10.1109/JSEN.2009.2039130
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
To achieve secure communication between sensor nodes in wireless sensor networks (WSNs), it is important to be able to establish efficient key predistribution mechanisms. Here, a matrix-based key predistribution scheme for WSN is presented, as shown in the following process. First, LU matrix-based method is employed to decompose the polynomial pool, which substitutes for the key pool to establish the shared keys. Second, the shared key is computed by the shared polynomial. Third, we can always compute the common polynomial with mutual authentication. The analysis indicates that the proposed scheme allows 100% connectivity regardless of the number of keys. To evaluate the efficiency of the network-wide memory overhead, each row or column of L and U matrices is divided into two parts: nonzero-element part and zero-element part. The results demonstrate that this method provides references for increasing the efficiency of LU matrix-based algorithms. By introducing polynomial-based key predistribtion, the resilience against node capture has been greatly enhanced as well.
引用
收藏
页码:1399 / 1409
页数:11
相关论文
共 20 条
[1]   A survey on sensor networks [J].
Akyildiz, IF ;
Su, WL ;
Sankarasubramaniam, Y ;
Cayirci, E .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (08) :102-114
[2]  
[Anonymous], ACM T INFORM SYSTEM, DOI DOI 10.1145/1053283
[3]  
BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
[4]   Perfectly secure key distribution for dynamic conferences [J].
Blundo, C ;
De Santis, A .
INFORMATION AND COMPUTATION, 1998, 146 (01) :1-23
[5]  
Çamtepe SA, 2004, LECT NOTES COMPUT SC, V3193, P293
[6]  
Chakrabarti D, 2005, LECT NOTES COMPUT SC, V3650, P89
[7]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[8]  
Chan HW, 2004, WIRELESS SENSOR NETWORKS, P277
[9]  
Du W., 2005, ACM Transactions on Information and Systems Security, V8, P228, DOI 10.1145/1065545.1065548
[10]  
Eschenauer L., 2002, ACM CCS2002, DOI DOI 10.1145/586110.586117