A Key Pre-distribution Scheme based on Sub-regions for Multi-Hop Wireless Sensor Networks

被引:0
|
作者
Yinghong Liu
Yuanming Wu
机构
[1] University of Electronic Science and Technology of China,School of Automation Engineering
[2] University of Electronic Science and Technology of China,School of Optoelectronic Science and Engineering
来源
关键词
Wireless sensor network; Key pre-distribution; Bivariate polynomial; Security; Sub-region;
D O I
暂无
中图分类号
学科分类号
摘要
The key pre-distribution schemes in wireless sensor networks (WSNs) have attracted researchers’ attentions recently in some applications. These researches of key pre-distribution focus on the balance among security, energy overhead and network resilience, because of the low computing ability, small storage and limited energy of nodes in WSNs. In this paper, a key pre-distribution scheme based on sub-regions is proposed for multi-hop wireless sensor networks. The significant contribution of this scheme is that both the least number of polynomials stored in one sensor node and the least number of nodes storing the same polynomial can be determined such that any two neighbor nodes can communicate securely. The sub-regions are formed by diffusing hop-by-hop without any node’s location information, and every node has at least one common polynomial with its neighbors to generate the session key between them. Even if k (k < t/2 + 1) nodes are compromised, the network, whose keys are produced by t-degree symmetric bivariate polynomials, still keeps secure. Moreover, the scheme balances the contradictory relationship among encryption techniques, energy overhead and network resilience. The theoretical analysis and simulation results show the scheme outperforms the poly&&q-composite scheme and sequence-based key management scheme in terms of energy overhead and network resilience.
引用
收藏
页码:1161 / 1180
页数:19
相关论文
共 50 条
  • [41] Hybrid secure random key pre-distribution scheme for wireless sensor networks
    Barakat, Tamer M.
    Gody, Amr M.
    2007 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS: ICCES '07, 2007, : 151 - +
  • [42] A key pre-distribution scheme using deployment knowledge for wireless sensor networks
    Yu, Z
    Guan, Y
    2005 FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING IN SENSOR NETWORKS, 2005, : 261 - 268
  • [43] A tamper-resistance key pre-distribution scheme for wireless sensor networks
    Xie, Lei
    Zhu, Hongsong
    Xu, Yongjun
    Zhu, Yuefei
    GCC 2006: FIFTH INTERNATIONAL CONFERENCE ON GRID AND COOPERATIVE COMPUTING WORKSHOPS, PROCEEDINGS, 2006, : 437 - +
  • [44] An Improved LU Matrix Key Pre-distribution Scheme for Wireless Sensor Networks
    Chen, Ni
    Yao, Jian Bo
    Wen, Gang Jun
    2008 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING, 2008, : 503 - 507
  • [45] A Novel Key Pre-distribution for Wireless Sensor Networks
    Qian, Sun
    INTERNATIONAL CONFERENCE ON SOLID STATE DEVICES AND MATERIALS SCIENCE, 2012, 25 : 2183 - 2189
  • [46] A Novel Scalable Key Pre-distribution Scheme for Wireless Sensor Networks Based on Residual Design
    Vahid Modiri
    Hamid Haj Seyyed Javadi
    Mohaddese Anzani
    Wireless Personal Communications, 2017, 96 : 2821 - 2841
  • [47] ID-Based multiple space key pre-distribution scheme for wireless sensor networks
    Dai, Tran Thanh
    Hong, Choong Seon
    WIRED/WIRELESS INTERNET COMMUNICATIONS, PROCEEDINGS, 2007, 4517 : 235 - +
  • [48] A Novel Scalable Key Pre-distribution Scheme for Wireless Sensor Networks Based on Residual Design
    Modiri, Vahid
    Javadi, Hamid Haj Seyyed
    Anzani, Mohaddese
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (02) : 2821 - 2841
  • [49] Performance Analysis of Connectivity on Multi-Hop Random Key Pre-Distribution
    Li, Wei-Shou
    Hsieh, Wen-Shyong
    2009 INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION AND SERVICE SCIENCE (NISS 2009), VOLS 1 AND 2, 2009, : 1325 - +
  • [50] A Self-healing Key Pre-Distribution Scheme for Multi-Phase Wireless Sensor Networks
    Messai, Mohamed-Lamine
    Seba, Hamida
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 144 - 151