期刊文献+

WSN中基于乱序多项式对偶密钥的攻击方案 被引量:2

Attacking scheme against the permutation-based multi-polynomial scheme for pair-wise key establishment in wireless sensor networks
下载PDF
导出
摘要 针对Guo等的WSN中基于乱序对称多项式的对偶密钥方案提出一种攻击方案。通过构造黑盒的方式,对多项式进行攻击,通过整体求解多项式集合,而不是求解单个多项式的方式,使多项式的排列顺序在多项式的破解中失去作用,从而实现乱序多项式的破解。定理证明和实例分析表明Guo等的方案不能抵御大规模节点俘获攻击,未能突破多项式的容忍门限,是一种不安全的方案。 An attacking scheme was proposed against the permutation-based multi-polynomial scheme proposed by Guo, et al for pair-wise key establishment in wireless sensor networks. Attacks on polynomials were carried out by construct- ing a black-box to integrally solve the set of polynomials rather than a single polynomial. The results show that this scheme can break the symmetric polynomials and make the permutation of polynomials lose its function. The proven theorems and instance analysis indicate that the scheme proposed by Guo, et al can't frustrate the large-scale node capture attack and can't break the tolerance threshold of polynomials. Therefore, the scheme is insecure.
出处 《通信学报》 EI CSCD 北大核心 2015年第8期110-117,共8页 Journal on Communications
基金 国家自然科学基金资助项目(61170168 61170169) 辽宁省教育厅科学技术基金资助项目(L2013517) 大连市科技计划基金资助项目(2013A16GX115)~~
关键词 无线传感器网络 对偶密钥 多项式 攻击 黑盒 WSN pair-wise key establishment polynomial attack black-box
  • 相关文献

参考文献20

  • 1RAGHINI M, MAHESWARI N U, VENKATESH R. Overview on key distribution primitives in wireless sensor network[J]. Journal of Computer Science, 2013, 9(5): 543.
  • 2BARUA M P, INDORA M S. Overview of security threats in WSN[J]. International Journal of Computer Science and Mobile Computing, ISSN, 2013, 2(7): 422-426.
  • 3ESCHENAUER L, GLIGOR V D. A key-management scheme for distributed sensor networks[A]. Proceedings of the 9th ACM Conference on Computer and Communicalion Socurity[C]. Washington, DC, USA, 2002.41-47.
  • 4CHAIN H, PERRIO A, SONG D. Random key predistdbutinn schemes for sensor networks[A]. Proceedings of the 2003 Symposium on Security and Privacy[C]. Carnegie Mellon, PA, USA, 2003,197-213.
  • 5LIU D, NING P. Location-based palrwise key establishments for static sensor networks[A]. Proceedings of the 1st ACM Workshop on Security of Ad Hoe and Sensor Networks[C]. New York, NY, USA, 2003.72-82.
  • 6LIU D, NING P, LI R. Establishing pairwise keys in distributed sensor networks[J]. ACM Transactions on Information and System Security (TISSEC), 2005, 8(1): 41-77.
  • 7DU W, DENG J, HAN Y S. A key predistribution scheme for sensor networks using deployment knowledge[J]. IEEE Transactions on Dependable and Secure Computing, 2006, 3(1): 62-77.
  • 8BLOM R. An optimal class of symmetric key generation systems[A]. Procendings of the EUROCRYPT 84 Workshop on Advances in Cryptology: Theory and Application of Cryptographic Tochniques[C]. New York, USA, 1985.335-338.
  • 9BLUNDO C, DE SANTIS A, HERZBERG A. Perfectly-secure key distribution for dynamic conferences[A]. Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology[C]. London, UK, 1993.471-486.
  • 10YU C M, LU C S, KUO S Y, Noninteractive pairwise key establishment for sensor networks[J]. IEEE Transactiom on Information Forensics and Security, 2010, 5(3): 556-569.

同被引文献11

引证文献2

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部