Secure Path Key Establishment Schemes Based on Random Key Management for WSN

被引:2
|
作者
Ahlawat, Priyanka [1 ]
Dave, Mayank [1 ]
机构
[1] Natl Inst Technol, Dept Comp Engn, Kurukshetra, Haryana, India
关键词
Node capture attack; q-Composite scheme; Path key establishment; Random key predistribution scheme; FINDING DISJOINT PATHS; NODE CAPTURE ATTACK; DISTRIBUTED ALGORITHM; SENSOR; PREDISTRIBUTION; EFFICIENT;
D O I
10.1007/s40010-020-00675-z
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
A large number of the path key establishment schemes regard same probability of the node capture attack for each node in the wireless sensor networks. However, in certain critical applications this statement may not be right making such schemes less practical for many real-world applications like border surveillance and disaster management. In this paper, an attack matrix (AM) is designed to calculate the attack coefficient of the sensor nodes at the time of their positioning in the sensor field. The path key exposure problem is minimized by bypassing the nodes with greatest value of attack coefficient. Three attack-resistant path key establishment schemes are presented based on the AM namely attack-resistant proxy-based path key establishment, attack-resistant friend-based path key establishment and attack-resistant disjoint path key establishment. We find that the proposed schemes show improved performance compared to the existing path key establishment schemes. The resistance against node capture of proposed schemes has been verified based on the probability of key recovery and path compromise ratio. The result outcomes prove their expediency in diminishing node capture impact.
引用
收藏
页码:555 / 567
页数:13
相关论文
共 50 条
  • [1] Secure Path Key Establishment Schemes Based on Random Key Management for WSN
    Priyanka Ahlawat
    Mayank Dave
    Proceedings of the National Academy of Sciences, India Section A: Physical Sciences, 2021, 91 : 555 - 567
  • [2] Authentication and Key Establishment in WSN Based on Key Predistribution
    N. N. Shenets
    Automatic Control and Computer Sciences, 2022, 56 : 947 - 956
  • [3] Authentication and Key Establishment in WSN Based on Key Predistribution
    Shenets, N. N.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2022, 56 (08) : 947 - 956
  • [4] Selecting key management schemes for WSN applications
    Alcaraz, Cristina
    Lopez, Javier
    Roman, Rodrigo
    Chen, Hsiao-Hwa
    COMPUTERS & SECURITY, 2012, 31 (08) : 956 - 966
  • [5] Secure Multipath Key Establishment Solution in WSN<bold> </bold>
    Sharma, Charu
    Vaid, Rohit
    MICRO-ELECTRONICS AND TELECOMMUNICATION ENGINEERING, ICMETE 2021, 2022, 373 : 323 - 330
  • [6] An Automated Lightweight Key Establishment Method for Secure Communication in WSN
    Akansha Singh
    Khushboo Jain
    Wireless Personal Communications, 2022, 124 : 2831 - 2851
  • [7] An Automated Lightweight Key Establishment Method for Secure Communication in WSN
    Singh, Akansha
    Jain, Khushboo
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 124 (04) : 2831 - 2851
  • [8] Robust and Secure Key Management in WSN using Arbitrary Key-Deployment
    Metan, Jyothi
    Murthy, K. N. Narasimha
    2015 INTERNATIONAL CONFERENCE ON EMERGING RESEARCH IN ELECTRONICS, COMPUTER SCIENCE AND TECHNOLOGY (ICERECT), 2015, : 246 - 250
  • [9] Secure Random Phase Key Exchange Schemes for Image Cryptography
    Kim, Youhyun
    Sim, Minwoo
    Moon, Inkyu
    Javidi, Bahram
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06): : 10855 - 10861
  • [10] A Hybrid Key Management Scheme for WSNs Based on PPBR and a Tree-Based Path Key Establishment Method
    Zhang, Ying
    Liang, Jixing
    Zheng, Bingxin
    Chen, Wei
    SENSORS, 2016, 16 (04)