A Key Pre-distribution Scheme based on Sub-regions for Multi-Hop Wireless Sensor Networks

被引:0
|
作者
Yinghong Liu
Yuanming Wu
机构
[1] University of Electronic Science and Technology of China,School of Automation Engineering
[2] University of Electronic Science and Technology of China,School of Optoelectronic Science and Engineering
来源
Wireless Personal Communications | 2019年 / 109卷
关键词
Wireless sensor network; Key pre-distribution; Bivariate polynomial; Security; Sub-region;
D O I
暂无
中图分类号
学科分类号
摘要
The key pre-distribution schemes in wireless sensor networks (WSNs) have attracted researchers’ attentions recently in some applications. These researches of key pre-distribution focus on the balance among security, energy overhead and network resilience, because of the low computing ability, small storage and limited energy of nodes in WSNs. In this paper, a key pre-distribution scheme based on sub-regions is proposed for multi-hop wireless sensor networks. The significant contribution of this scheme is that both the least number of polynomials stored in one sensor node and the least number of nodes storing the same polynomial can be determined such that any two neighbor nodes can communicate securely. The sub-regions are formed by diffusing hop-by-hop without any node’s location information, and every node has at least one common polynomial with its neighbors to generate the session key between them. Even if k (k < t/2 + 1) nodes are compromised, the network, whose keys are produced by t-degree symmetric bivariate polynomials, still keeps secure. Moreover, the scheme balances the contradictory relationship among encryption techniques, energy overhead and network resilience. The theoretical analysis and simulation results show the scheme outperforms the poly&&q-composite scheme and sequence-based key management scheme in terms of energy overhead and network resilience.
引用
收藏
页码:1161 / 1180
页数:19
相关论文
共 50 条
  • [1] A Key Pre-distribution Scheme based on Sub-regions for Multi-Hop Wireless Sensor Networks
    Liu, Yinghong
    Wu, Yuanming
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 109 (02) : 1161 - 1180
  • [2] A Secure Key Pre-distribution Scheme for Wireless Sensor Networks
    Liu, Ming
    Wei, Wei
    Liu, Zhihong
    ICIEA: 2009 4TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOLS 1-6, 2009, : 1753 - +
  • [3] A novel key pre-distribution scheme for wireless sensor networks
    Daneshjoo P.
    Javadi H.H.S.
    Hosseinzadeh M.
    Journal of Computational and Theoretical Nanoscience, 2016, 13 (01): : 1051 - 1054
  • [4] An efficient scheme for key pre-distribution in wireless sensor networks
    Boujelben, Manel
    Youssef, Habib
    Abid, Mohamed
    2008 4TH IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2008, : 532 - 537
  • [5] A Key Pre-Distribution Scheme based on Multiple Block Codes for Wireless Sensor Networks
    Arjmandi, Hamidreza
    Lahouti, Farshad
    2014 7TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2014, : 857 - 860
  • [6] A new scheme of key pre-distribution based on public key for wireless sensor networks
    Yuan, Jia bin
    Ding, Xiang xiang
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 191 - 196
  • [7] MKPS: A multi-level key pre-distribution scheme for secure wireless sensor networks
    Choi, Sung Jin
    Youn, Hee Yong
    HUMAN-COMPUTER INTERACTION, PT 2, PROCEEDINGS, 2007, 4551 : 808 - +
  • [8] Random Cooperative Key Pre-Distribution Scheme in Wireless Sensor Networks
    Zhao, Xiaojuan
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (11) : 52 - 63
  • [9] An improved matrix key pre-distribution scheme for wireless sensor networks
    Chen, Ni
    Yao, Jian-bo
    Wen, Guang-jun
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2008, : 40 - 45
  • [10] A Novel Key Pre-distribution Scheme in Wireless Sensor Networks
    Qin, Zhongyuan
    Wang, Yuying
    Wang, Hengkang
    Huang, Jie
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 615 - 619