A Polynomial-Based Key Distribution Approach for Wireless Sensor Networks

被引:2
|
作者
Moussavi, Alireza [1 ]
Shamsi, Mostafa [1 ]
机构
[1] Amirkabir Univ Technol, Fac Math & Comp Sci, Tehran 15914, Iran
关键词
Polynomial-based key predistribution scheme; Blom-Blundo et al. key predistribution scheme; Convolutional codes; Wireless sensor network (WSN); CODES;
D O I
10.1007/s40995-017-0330-x
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Network coding is a novel concept for improving network capacity. This additional capacity may be used to increase throughput or reliability. Also in wireless networks, network coding has been proposed as a method for improving communication. The polynomial-based key predistribution scheme of Blom and Blundo et al. has been the basic ingredient for the key establishment for wireless sensor network (WSN). It is tempting to use many random and different instances of polynomial-based key predistribution scheme for various parts of the WSN to enhance the efficiency of WSN key establishment protocols. But it is not secure in general to use many instances of Blom-Blundo et al. polynomial-based key predistribution scheme in a WSN key establishment protocol. Thus the previously constructed group-based type WSN key predistribution schemes using polynomial-based key predistribution scheme are insecure. In this paper, a suitable error correction code is chosen based on codes of the type which are described as irreducible graded cyclic CCs which can algebraically be described by one-sided principal ideals in a noncommutative algebra A[x; alpha], where A similar or equal to F[x]/(x(n) - 1), F is a finite field and n is the length of the code. This leads to the notion of a generator polynomial just like for cyclic block codes. Similarly, a parity check polynomial can be introduced by considering the right annihilator ideal. This way indicates that the big class of sigma-cyclic convolutional codes contains quite some good codes and deserves to be investigated further.
引用
收藏
页码:13 / 20
页数:8
相关论文
共 50 条
  • [41] An Asymmetric Encryption-Based Key Distribution Method for Wireless Sensor Networks
    Cheng, Yuan
    Liu, Yanan
    Zhang, Zheng
    Li, Yanxiu
    SENSORS, 2023, 23 (14)
  • [42] NBK: A Novel Neighborhood Based Key Distribution Scheme for Wireless Sensor Networks
    Xue, Kaiping
    Xiong, Wanxing
    Hong, Peilin
    Lu, Hancheng
    ICNS: 2009 FIFTH INTERNATIONAL CONFERENCE ON NETWORKING AND SERVICES, 2009, : 175 - 179
  • [43] Grid-Based Key Pre-Distribution in Wireless Sensor Networks
    Mohaisen, Abedelaziz
    Nyang, DaeHun
    Maeng, YoungJae
    Lee, KyungHee
    Hong, Dowon
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2009, 3 (02): : 195 - 208
  • [44] A Key Pre-distribution Scheme Based on Multiple Key Spaces in Wireless Sensor Networks
    Wang, Yuying
    Qin, Zhongyuan
    Zhang, Qunfang
    Wang, Hengkang
    Huang, Jie
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 652 - 656
  • [45] A new scheme of key pre-distribution based on public key for wireless sensor networks
    Yuan, Jia bin
    Ding, Xiang xiang
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 191 - 196
  • [46] A Graph Theoretic Approach for Optimizing Key Pre-distribution in Wireless Sensor Networks
    Chan, Aldar C-F.
    2009 7TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC, AND WIRELESS, 2009, : 259 - 266
  • [47] Polynomial-Based Lightweight Key Management in a Permissioned Blockchain
    Albakri, Ashwag
    Harn, Lein
    Maddumala, Mahesh
    2019 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2019,
  • [48] Smooth SVM research: A polynomial-based approach
    Fan Yan-Feng
    Mang De-Xian
    He Hua-Can
    2007 6TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS & SIGNAL PROCESSING, VOLS 1-4, 2007, : 1239 - +
  • [49] Symmetric key and polynomial-based key generation mechanism for secured data communications in 5G networks
    Pradeep, S.
    Muthurajkumar, S.
    Ganapathy, Sannasi
    Kannan, A.
    SOFT COMPUTING, 2024, 28 (05) : 4531 - 4549
  • [50] Improved One-Way Hash Chain and Revocation Polynomial-Based Self-Healing Group Key Distribution Schemes in Resource-Constrained Wireless Networks
    Chen, Huifang
    Xie, Lei
    SENSORS, 2014, 14 (12): : 24358 - 24380