An Asymmetric Encryption-Based Key Distribution Method for Wireless Sensor Networks

被引:4
|
作者
Cheng, Yuan [1 ]
Liu, Yanan [1 ]
Zhang, Zheng [1 ]
Li, Yanxiu [1 ]
机构
[1] Jinling Inst Technol, Sch Network Secur, Nanjing 211100, Peoples R China
关键词
WSN; security; key distribution; cryptography; AUTHENTICATION SCHEME; MANAGEMENT SCHEME; SECURITY; CRYPTOGRAPHY;
D O I
10.3390/s23146460
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Wireless sensor networks are usually applied in hostile areas where nodes can easily be monitored and captured by an adversary. Designing a key distribution scheme with high security and reliability, low hardware requirements, and moderate communication load is crucial for wireless sensor networks. To address the above objectives, we propose a new key distribution scheme based on an ECC asymmetric encryption algorithm. The two-way authentication mechanism in the proposed scheme not only prevents illegal nodes from accessing the network, but also prevents fake base stations from communicating with the nodes. The complete key distribution and key update methods ensure the security of session keys in both static and dynamic environments. The new key distribution scheme provides a significant performance improvement compared to the classical key distribution schemes for wireless sensor networks without sacrificing reliability. Simulation results show that the proposed new scheme reduces the communication load and key storage capacity, has significant advantages in terms of secure connectivity and attack resistance, and is fully applicable to wireless sensor networks.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Dynamic key distribution method for wireless sensor networks based on exponential algorithm
    Zhao, Yun
    Xiao, Yong
    Lin, Weibin
    Cui, Chao
    Xu, Di
    [J]. INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2023, 16 (01) : 97 - 111
  • [2] Identity-Based Key Agreement and Encryption For Wireless Sensor Networks
    Yang, Geng
    Rong, Chunming
    Veigner, Christian
    Wang, Jiangtao
    Cheng, Hongbing
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (5B): : 182 - 189
  • [4] Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks
    Saleem, Kashif
    Derhab, Abdelouahid
    Orgun, Mehmet A.
    Al-Muhtadi, Jalal
    Rodrigues, Joel J. P. C.
    Khalil, Mohammed Sayim
    Ahmed, Adel Ali
    [J]. SENSORS, 2016, 16 (04)
  • [5] A public key encryption model for wireless sensor networks
    Rodriguez, H.
    Ontiveros, B.
    Soto, I.
    Carrasco, R.
    [J]. CSNDSP 08: PROCEEDINGS OF THE SIXTH INTERNATIONAL SYMPOSIUM ON COMMUNICATION SYSTEMS, NETWORKS AND DIGITAL SIGNAL PROCESSING, 2008, : 373 - +
  • [6] Secret Key Encryption Model for Wireless Sensor Networks
    Khan, Abdullah
    Shah, Syed Waqar
    Ali, Abdar
    Ullah, Rizwan
    [J]. PROCEEDINGS OF 2017 14TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2017, : 809 - 815
  • [7] Public key based key distribution scheme for wireless sensor networks
    Huang, Jie
    Huang, Bei
    [J]. Tongxin Xuebao/Journal on Communications, 2011, 32 (10): : 52 - 58
  • [8] Elliptic curve encryption-based energy-efficient secured ACO routing protocol for wireless sensor networks
    Yesodha, K.
    Krishnamurthy, M.
    Thangaramya, K.
    Kannan, A.
    [J]. JOURNAL OF SUPERCOMPUTING, 2024, 80 (13): : 18866 - 18899
  • [9] An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks
    Haque, Md. Mokammel
    Pathan, Al-Sakib Khan
    Hong, Choong Seon
    Huh, Eui-Nam
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2008, 2 (05): : 265 - 279
  • [10] On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks
    Mohaisen, Abedelaziz
    Choi, Jeong Woon
    Hong, Dowon
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2009, 3 (04): : 376 - 384