ID-Based multiple space key pre-distribution scheme for wireless sensor networks

被引:0
作者
Dai, Tran Thanh [1 ]
Hong, Choong Seon [1 ]
机构
[1] Kyung Hee Univ, Dept Comp Engn, Networking Lab, Seoul, South Korea
来源
WIRED/WIRELESS INTERNET COMMUNICATIONS, PROCEEDINGS | 2007年 / 4517卷
关键词
ID-based; random key pre-distribution; key agreement; security; wireless sensor networks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Providing security services for wireless sensor networks plays a vital role in secure network operation especially when sensor networks are deployed in hostile areas. In order to pave the way for these mechanisms, cryptographic keys must be agreed on by communicating nodes. Unfortunately, due to resource constraints, the key agreement problem in wireless sensor networks becomes quite intricate. To deal with this problem, many public-key unrelated proposals have been proposed so far. One prominent branch of these proposals is based on random key pre-distribution. Inspired by this trend, in this paper, we propose a new random key pre-distribution scheme that is comparable to Du et al.'s scheme [2] in terms of network resiliency and memory usage. On the other hand, our later analysis shows that our scheme outperforms Du et al.'s scheme in terms of computational and communication overhead.
引用
收藏
页码:235 / +
页数:3
相关论文
共 15 条
[1]  
BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
[2]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[3]  
Chan SP, 2005, GLOB TELECOMM CONF, P1007
[4]  
Dai TT, 2006, LECT NOTES COMPUT SC, V4208, P260
[5]  
DAI TT, 2006, P 7 WISA 2006 JEJ IS, P121
[6]  
Du W., 2005, ACM Transactions on Information and Systems Security, V8, P228, DOI 10.1145/1065545.1065548
[7]  
Eschenauer L., 2002, Proceedings of the ACM Conference on Computer and Communications Security, P41, DOI [10.1145/586110.586117, DOI 10.1145/586110.586117]
[8]  
Fu HR, 2005, Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics Information Assurance Workshop, P134
[9]  
LIU D, 2003, P 10 ACM C COMP COMM, P52
[10]  
MATSUMOTO T, 1988, LECT NOTES COMPUT SC, V293, P185