A Research of Improving the EG Key Pre-Distribution Scheme Based on the Hash Function and the Multi-Path Routing

Article Preview

Abstract:

The EG scheme also had some shortcomings: the node could not resist attack effectively, and only one routing path was used during the communication. To solve these problems, this scheme proposed to use the multi-path routing to replace the one routing, and the pairwise key was established after the hash function. The connectivity of the system was improved by the multi-path routing, if one routing path was broken, there were also some other alternative paths. Due to the hash function, the attackers could not get any useful information. So the proposed scheme can not only develop the connectivity of the WSNs, but also improve the security of the system.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 998-999)

Pages:

1343-1346

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] L. Eschenauer, V. Gligor. A key management scheme for distributed sensor networks. in: Proceeding of the 9th ACM Conference on Computer and Communications Security. Washington: ACM, 2002, 41-47.

DOI: 10.1145/586110.586117

Google Scholar

[2] H. Chan, A. Perrig and D. Song. Random key predistribution schemes for sensor networks. in: Proc. 20003 IEEE Symposium on Security and Privacy, pp.197-313, May (2003).

Google Scholar

[3] J. Zhang, J. Li, X. Liu. A Strong Key Pre-distribution Scheme for Wireless Sensor networks. in: 2009 International Conference on Networks Security, Wireless Communication and Trust Computing. NSWCTC, 2009. pp.231-234, Apr. (2009).

DOI: 10.1109/nswctc.2009.43

Google Scholar

[4] D. Liu, P. Ning. Establishing pairwise keys in distributed sensor networks,. ACM Transactions on Information and System Security, 2005, 8(1): 41~77.

DOI: 10.1145/1053283.1053287

Google Scholar

[5] Zhao Jinchao. Research on Key Predistribution Scheme of WirelessSensor Networks. in: Intelligent Computation Technology and Automation (ICICTA), 2012 Fifth International Conference on. 2012 , pp: 287 - 290.

DOI: 10.1109/icicta.2012.79

Google Scholar

[6] J. Zhang, Q. Cui, X. Liu. An Efficient Key Management Scheme for Wireless Sensor Networks in Hostile Environments[A]. in: International Conference on Multimedia Information Networking and Security, 2009: pp.417-420.

DOI: 10.1109/mines.2009.157

Google Scholar

[7] Zhiming Zhang. Multiple-Path Redundancy Secret Anonymous Routing Protocol for Wireless Sensor Networks. in: Wireless Communications Networking and Mobile Computing (WiCOM), 2010 6th International Conference on , 2010, pp: 1-4.

DOI: 10.1109/wcins.2010.5544121

Google Scholar

[8] R. Sangeetha, M. Yuvaraju. Secure Energy-Aware Multipath Routing Protocolwith Transmission Range Adjustment for Wireless Sensor Networks. in: Computational Intelligence & Computing Research (ICCIC), 2012 IEEE International Conference on. 18-20 Dec. 2012, pp: 1-4.

DOI: 10.1109/iccic.2012.6510278

Google Scholar