A Secure Scheme Based on One-Way Associated Key Management Model in Wireless Sensor Networks

被引:3
作者
Li, Sujun [1 ,2 ]
Zhou, Boqing [1 ,2 ]
Hu, Qinqin [3 ]
Wang, Jianxin [4 ]
Dai, Jingguo [1 ]
Wang, Weiping [4 ]
Yuan, Huiyong [1 ]
Cheng, Yun [5 ]
Wu, Jie [6 ]
机构
[1] Shaoguan Univ, Sch Informat Engn, Shaoguan 512005, Peoples R China
[2] Hunan Normal Univ, Sch Math & Stat, MOE LCSM, Changsha 410081, Peoples R China
[3] Hunan Inst Sci & Technol, Sch Informat Sci & Engn, Yueyang 414006, Peoples R China
[4] Cent South Univ, Sch Comp Sci & Engn, Changsha 410083, Peoples R China
[5] Hunan Univ Humanities Sci & Technol, Sch Informat, Loudi 417000, Peoples R China
[6] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
基金
中国国家自然科学基金;
关键词
Wireless sensor networks; Adaptation models; Internet of Things; Electronic mail; Cryptography; Analytical models; Deployment error; one-way associated key management model; secure; wireless sensor networks (WSNs); PREDISTRIBUTION;
D O I
10.1109/JIOT.2020.3021740
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To achieve security in wireless sensor networks (WSNs), it is important to be able to encrypt messages sent among sensor nodes by using shared keys between them. Due to resource constraints, achieving such key agreement in WSNs is nontrivial. Previous research indicates that key management schemes using deployment knowledge can significantly improve the performance of WSNs. Nevertheless, in these schemes, resilient local connectivity and resilient global connectivity become unstable when deployment error changes. To resolve the above problem, in this article, a one-way associated key management model is proposed. In this model, the key pool consists of two layers: 1) the global layer and 2) the local layer. According to different deployment errors, the number of keys allocated from the global key pool and local key pools can be dynamically adjusted, thereby improving the stability of networks' performance. In multiphase sensor networks, analysis and simulation indicate that our scheme has better adaptability in applications where deployment error changes as compared with related schemes.
引用
收藏
页码:2920 / 2930
页数:11
相关论文
共 21 条
  • [1] Boqing Zhou, 2014, International Journal of Network Security, V16, P221
  • [3] A key predistribution scheme for sensor networks using deployment knowledge
    Du, WL
    Deng, J
    Han, YSS
    Varshney, PK
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2006, 3 (01) : 62 - 77
  • [4] A high performance and intrinsically secure key establishment protocol for wireless sensor networks
    Fanian, Ali
    Berenjkoub, Mehdi
    Saidi, Hossein
    Gulliver, T. Aaron
    [J]. COMPUTER NETWORKS, 2011, 55 (08) : 1849 - 1863
  • [5] Fast Hierarchical Key Management Scheme With Transitory Master Key for Wireless Sensor Networks
    Gandino, Filippo
    Ferrero, Renato
    Montrucchio, Bartolomeo
    Rebaudengo, Maurizio
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (06): : 1334 - 1345
  • [6] Scaling Laws of Key Predistribution Protocols in Wireless Sensor Networks
    Gu, Wenjun
    Chellappan, Sriram
    Bai, Xiaole
    Wang, Honggang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (04) : 1370 - 1381
  • [7] Karlof C, 2003, PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL WORKSHOP ON SENSOR NETWORK PROTOCOLS AND APPLICATIONS, P113, DOI 10.1109/snpa.2003.1203362
  • [8] A Secure Random Key Distribution Scheme Against Node Replication Attacks in Industrial Wireless Sensor Systems
    Li, Longpeng
    Xu, Guangquan
    Jiao, Litao
    Li, Xiaotong
    Wang, Hao
    Hu, Jing
    Xian, Hequn
    Lian, Wenjuan
    Gao, Honghao
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (03) : 2091 - 2101
  • [9] A (M, m) Authentication Scheme Against Mobile Sink Replicated Attack in Unattended Sensor Networks
    Li, Sujun
    Wang, Weiping
    Zhou, Boqing
    Wang, Jianxin
    Cheng, Yun
    Wu, Jie
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2018, 7 (02) : 250 - 253
  • [10] A Secure Scheme for Heterogeneous Sensor Networks
    Li, Sujun
    Wang, Weiping
    Zhou, Boqing
    Wang, Jianxin
    Cheng, Yun
    Wu, Jie
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2017, 6 (02) : 182 - 185