A Key Pre-distribution Scheme based on Sub-regions for Multi-Hop Wireless Sensor Networks

被引:0
|
作者
Yinghong Liu
Yuanming Wu
机构
[1] University of Electronic Science and Technology of China,School of Automation Engineering
[2] University of Electronic Science and Technology of China,School of Optoelectronic Science and Engineering
来源
关键词
Wireless sensor network; Key pre-distribution; Bivariate polynomial; Security; Sub-region;
D O I
暂无
中图分类号
学科分类号
摘要
The key pre-distribution schemes in wireless sensor networks (WSNs) have attracted researchers’ attentions recently in some applications. These researches of key pre-distribution focus on the balance among security, energy overhead and network resilience, because of the low computing ability, small storage and limited energy of nodes in WSNs. In this paper, a key pre-distribution scheme based on sub-regions is proposed for multi-hop wireless sensor networks. The significant contribution of this scheme is that both the least number of polynomials stored in one sensor node and the least number of nodes storing the same polynomial can be determined such that any two neighbor nodes can communicate securely. The sub-regions are formed by diffusing hop-by-hop without any node’s location information, and every node has at least one common polynomial with its neighbors to generate the session key between them. Even if k (k < t/2 + 1) nodes are compromised, the network, whose keys are produced by t-degree symmetric bivariate polynomials, still keeps secure. Moreover, the scheme balances the contradictory relationship among encryption techniques, energy overhead and network resilience. The theoretical analysis and simulation results show the scheme outperforms the poly&&q-composite scheme and sequence-based key management scheme in terms of energy overhead and network resilience.
引用
收藏
页码:1161 / 1180
页数:19
相关论文
共 50 条
  • [1] A Key Pre-distribution Scheme based on Sub-regions for Multi-Hop Wireless Sensor Networks
    Liu, Yinghong
    Wu, Yuanming
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 109 (02) : 1161 - 1180
  • [2] A key pre-distribution scheme for wireless sensor networks
    Price, A
    Kosaka, K
    Chatterjee, S
    2005 Wireless Telecommunications Symposium, 2005, : 253 - 260
  • [3] A strong key pre-distribution scheme for wireless sensor networks
    Kim, Taeyeon
    Wang, Gicheol
    UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2006, 4159 : 854 - 863
  • [4] An efficient scheme for key pre-distribution in wireless sensor networks
    Boujelben, Manel
    Youssef, Habib
    Abid, Mohamed
    2008 4TH IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2008, : 532 - 537
  • [5] Enhancing the Key Pre-distribution Scheme on Wireless Sensor Networks
    Shan, Tzu-Hsuan
    Liu, Chuan-Ming
    2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 1127 - 1131
  • [6] A novel key pre-distribution scheme for wireless sensor networks
    Daneshjoo P.
    Javadi H.H.S.
    Hosseinzadeh M.
    Journal of Computational and Theoretical Nanoscience, 2016, 13 (01): : 1051 - 1054
  • [7] A New Key Pre-distribution Scheme for Wireless Sensor Networks
    Jian, Bo
    Luo, Chang-yuan
    Guo, Yong-hui
    Li, Wei
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 333 - 336
  • [8] A Hybrid Key Pre-distribution Scheme for Wireless Sensor Networks
    Xiong, Chao
    Li, Shuquan
    Liu, Lei
    Li, Rui
    Jin, Yanjiao
    2019 3RD INTERNATIONAL CONFERENCE ON MACHINE VISION AND INFORMATION TECHNOLOGY (CMVIT 2019), 2019, 1229
  • [9] A Strong Key Pre-distribution Scheme for Wireless Sensor Networks
    Zhang, Jianmin
    Li, Jian
    Liu, Xiande
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 231 - +
  • [10] A Novel Key Pre-distribution Scheme in Wireless Sensor Networks
    Qin, Zhongyuan
    Wang, Yuying
    Wang, Hengkang
    Huang, Jie
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 615 - 619