期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Can the Polynomial Based Key Predistribution Scheme Be Used Many Times in One Wireless Sensor Network Key Establishment Protocol?
1
作者 许丽卿 陈豪 《Journal of Shanghai Jiaotong university(Science)》 EI 2013年第3期376-384,共9页
Key establishment is the basic step for the wireless sensor network (WSN) security. The polynomial based key predistribution scheme of Blom and Blundo et al. has been the basic ingredient for the key establishment f... Key establishment is the basic step for the wireless sensor network (WSN) security. The polynomial based key predistribution scheme of Blom and Blundo et al. has been the basic ingredient for the key establishment for WSNs. It is tempting to use many random and different instances of polynomial based key predistribution scheme for various parts of the WSN to enhance the efficiency of WSN key establishment protocols. This paper indicates that it is not secured in general to use many instances of Blom-Blundo et al. polynomial based key predistribution scheme in a WSN key establishment protocol. Thus the previously constructed group-based type WSN key predistribution schemes using polynomial based key predistribution scheme are insecure. We propose new generalized Bloin-Blundo et al. key predistribution schemes. These new generalized Blom-Blundo et al. key predistribution schemes can be used many times in one WSN key establishment protocol with only a small increase of cost. The application to group-based WSN key predistribution schemes is given. 展开更多
关键词 polynomial based key predistribution scheme generalized Blom-Blundo et al. key predistribution scheme clustered wireless sensor network (WSN)
原文传递
A General Pairwise Key Predistribution Scheme for Wireless Sensor Networks 被引量:2
2
作者 DING Xiaoyu LIU Zhiping SHAO Dingrong 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期744-748,共5页
This paper develops a general hypercube-based key predistribution scheme for establishing pairwise keys between sensor nodes using polynomials, which is parameterized by the dimension of hypercube and the Hamming dist... This paper develops a general hypercube-based key predistribution scheme for establishing pairwise keys between sensor nodes using polynomials, which is parameterized by the dimension of hypercube and the Hamming distance threshold variables. The scheme addresses the weaknesses of existing key predistribution schemes, which have either worse security or lower efficiency. It exhibits a nice property--when the Hamming distance between any two neighboring sensor nodes is less than the pre-defined threshold, the pairwise key can be established directly. Extensive performance and security analysis shows that by increasing Hamming distance threshold value, we can trade off the resilience against node capture attack for higher probability of direct pairwise key establishment, so as to save the energy consumption which is the most important issue for sensor networks. 展开更多
关键词 pairwise key establishment sensor networks hypercube-based key predistribution POLYNOMIAL Hamming distance
原文传递
A Class of Key Predistribution Schemes Based on Orthogonal Arrays 被引量:1
3
作者 董军武 裴定一 王学理 《Journal of Computer Science & Technology》 SCIE EI CSCD 2008年第5期825-831,共7页
Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely with each other using cryptographic techniques. In order to ensure this security, many a... Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely with each other using cryptographic techniques. In order to ensure this security, many approaches have been proposed recently. One of them is to use key predistribution schemes (KPSs) by means of combinatorial designs. In this paper, we use the Bush's construction of orthogonal arrays to present a class of key predistribution schemes for distributed sensor networks. The secure connectivity and resilience of the resulting sensor network are analyzed. This KPS constructed in our paper has some better properties than those of the existing schemes. 展开更多
关键词 sensor network key predistribution scheme combinatorial design orthogonal array Bush's construction
原文传递
Optimization of Key Predistribution Protocol Based on Supernetworks Theory in Heterogeneous WSN
4
作者 Qi Yuan Chunguang Ma +2 位作者 Xiaorui Zhong Gang Du Jiansheng Yao 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第3期333-343,共11页
This work develops an equilibrium model for finding the optimal distribution strategy to maximize performance of key predistribution protocols in terms of cost, resilience, connectivity, and lifetime. As an essential ... This work develops an equilibrium model for finding the optimal distribution strategy to maximize performance of key predistribution protocols in terms of cost, resilience, connectivity, and lifetime. As an essential attribute of wireless sensor networks, heterogeneity and its impacts on random key predistribution protocols are first discussed. Using supernetworks theory, the optimal node deployment model is proposed and illustrated. In order to find the equilibrium performance of our model, all optimal performance functions are changed into variational inequalities so that this optimization problem can be solved. A small-scale example is presented to illustrate the applicability of our model. 展开更多
关键词 OPTIMIZATION key predistribution protocol supernetworks variational inequality wireless sensornetworks
原文传递
A Cumulative Authentication Method for Securing Source Routing Protocols in Ad Hoc Networks
5
作者 B.Moussakhani S.M.Safavi H.Ebrahimzad 《China Communications》 SCIE CSCD 2007年第1期40-47,共8页
Initial works in ad hoc routing have considered only the problem of providing efficient mechanisms for finding paths in such networks,without considering security as a major problem.In such a trusted environment,malic... Initial works in ad hoc routing have considered only the problem of providing efficient mechanisms for finding paths in such networks,without considering security as a major problem.In such a trusted environment,malicious behaviors can disturb routing process.We present the design and performance evaluation of a new secure on-demand routing protocol for ad hoc networks, called CASR.CASR is robust against attackers from outside of the network and even it prevents compromised nodes from tampering with uncompromised routes consisting of uncompromised nodes.Because of using symmetric cryptography in its structure,CASR is robust against large number of types of Denial-of -Service attacks.However,due to the applying of the random key predistributions method to the routing process our proposed scheme reaches a trade-off between the degree of security and complexity. 展开更多
关键词 ad HOC networks routing security CRYPTOGRAPHY random key predistributions
下载PDF
Hierarchical Hypercube Based Pairwise Key Establishment Scheme for Sensor Networks
6
作者 Lei WANG 《International Journal of Communications, Network and System Sciences》 2009年第2期142-154,共13页
Security schemes of pairwise key establishment, which enable sensors to communicate with each other se-curely, play a fundamental role in research on security issue in wireless sensor networks. A general frame-work fo... Security schemes of pairwise key establishment, which enable sensors to communicate with each other se-curely, play a fundamental role in research on security issue in wireless sensor networks. A general frame-work for key predistribution is presented, based on the idea of KDC (Key Distribution Center) and polyno-mial pool schemes. By utilizing nice properties of H2 (Hierarchical Hypercube) model, a new security mechanism for key predistribution based on such model is also proposed. Furthermore, the working per-formance of tolerance resistance is seriously inspected in this paper. Theoretic analysis and experimental fig-ures show that the algorithm addressed in this paper has better performance and provides higher possibilities for sensor to establish pairwise key, compared with previous related works. 展开更多
关键词 Pairwise KEY Sensor Networks KEY POOL KEY predistribution H2 Framework
下载PDF
Constructions for key distribution patterns 被引量:1
7
作者 Shangdi CHEN Huihui WEI 《Frontiers of Mathematics in China》 SCIE CSCD 2017年第2期301-323,共23页
Abstract Key distribution patterns (KDPs) are finite incidence structures satisfying a certain property which makes them widely used in minimizing the key storage and ensuring the security of communication between u... Abstract Key distribution patterns (KDPs) are finite incidence structures satisfying a certain property which makes them widely used in minimizing the key storage and ensuring the security of communication between users in a large network. We construct a new KDP using t-design and combine two ω-KDPs to give new (ω- 1)-KDPs, which provide secure communication in a large network and minimize the amount of key storage. 展开更多
关键词 Key predistribution scheme (KPS) key distribution pattern (KDP) incidence structure design wireless sensor network (WSN)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部