The Key Predistribution Mechanism for Wireless Sensor Networks

Article Preview

Abstract:

For symmetric key-based key distribution techniques will not completely solve the security problem of key distribution in wireless sensor networks, a public key with certificate-based key pre-distribution scheme, the base station using a series of original public key and a single collection to the hash function to produce a public key, and for each node were randomly assigned to a subset of public and private key and public key set. Private key only, the program can not only improve the safety performance of the network, but also improve the storage overhead of the network. The program compared with the traditional key pre-distribution scheme, both to ensure the security of the network, both network and node resources are limited practical under the premise of constant connectivity, network security and network scalability margin to improve.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1028-1031

Citation:

Online since:

June 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] CHENG Y, AGRAWAL D P. An improved key distribution mechanism for large-scale hierarchical wireless sensor networks. Ad Hoc Networks, (2007), (v5): 35-48.

DOI: 10.1016/j.adhoc.2006.05.011

Google Scholar

[2] LIU D, NING P. Establishing pairwise keys in distributed sensor networks[A].Proceedings of the Conference on Computer and CommunicationsSecurity'03 ACM Press, Washington DC (2003). 52-61.

DOI: 10.1145/948109.948119

Google Scholar

[3] ROMAN R, ALCARAZ C. Applicability of public key infrastructures in wireless sensor networks. Lecture Notes in Computer Science,(2007), 4582: 313-320.

DOI: 10.1007/978-3-540-73408-6_22

Google Scholar

[4] MAINWARING A, POLASTRE J, SZEWCZYK R,et al. Wireless sensor netwo rks for habitat monitoring . ACM international wor kshop on wireless sensor networks and applications, (2002).

DOI: 10.1145/570738.570751

Google Scholar

[5] ZH U S, SETIA S, JAJODIA S. LEAP: efficient secur ity mechanisms for large scale dist ributed sensor networks. In the 10th ACM Conference on Computer and Communications Security ( CCS 03) , (2003): 62-72.

DOI: 10.1145/948109.948120

Google Scholar

[6] SAVVIDES A, H AN C C, SRIVAST AVA M B. Dynamic fineg rained localization in adhoc netw orks of sensors. Rome: In Proceeding s of MobiCom2001, (2001): 16-21.

Google Scholar

[7] W Du, et al. A pairw ise key pre- distribution scheme for wireless sensor networks. ACM Transact ion s on In form ation and System Security, (2005), 8(2) : 228-258.

Google Scholar

[8] R Gennaro, et al. Secure distributed key generation for discrete-log based cryptosystems. Journal of Cryptology, (2007), 20 (1):51- 83.

DOI: 10.1007/s00145-006-0347-3

Google Scholar