Secure Path Key Establishment Schemes Based on Random Key Management for WSN

被引:2
|
作者
Ahlawat, Priyanka [1 ]
Dave, Mayank [1 ]
机构
[1] Natl Inst Technol, Dept Comp Engn, Kurukshetra, Haryana, India
关键词
Node capture attack; q-Composite scheme; Path key establishment; Random key predistribution scheme; FINDING DISJOINT PATHS; NODE CAPTURE ATTACK; DISTRIBUTED ALGORITHM; SENSOR; PREDISTRIBUTION; EFFICIENT;
D O I
10.1007/s40010-020-00675-z
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
A large number of the path key establishment schemes regard same probability of the node capture attack for each node in the wireless sensor networks. However, in certain critical applications this statement may not be right making such schemes less practical for many real-world applications like border surveillance and disaster management. In this paper, an attack matrix (AM) is designed to calculate the attack coefficient of the sensor nodes at the time of their positioning in the sensor field. The path key exposure problem is minimized by bypassing the nodes with greatest value of attack coefficient. Three attack-resistant path key establishment schemes are presented based on the AM namely attack-resistant proxy-based path key establishment, attack-resistant friend-based path key establishment and attack-resistant disjoint path key establishment. We find that the proposed schemes show improved performance compared to the existing path key establishment schemes. The resistance against node capture of proposed schemes has been verified based on the probability of key recovery and path compromise ratio. The result outcomes prove their expediency in diminishing node capture impact.
引用
收藏
页码:555 / 567
页数:13
相关论文
共 50 条
  • [21] Key establishment algorithms for some deterministic key predistribution schemes
    Ruj, Sushmita
    Roy, Birnal
    WOSIS 2008: SECURITY IN INFORMATION SYSTEMS, PROCEEDINGS, 2008, : 68 - 77
  • [22] Unconditionally secure key assignment schemes
    De Santis, A
    Ferrara, AL
    Masucci, B
    DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 234 - 252
  • [23] Research on Secure Communication Scheme of Clustered WSN Based on Dynamic Key
    Li Li
    Zhu Yafei
    Duan Xiaoyi
    Shi Guozhen
    2016 IEEE INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC), 2016, : 833 - 837
  • [24] A key management scheme of wsn based on trust mechanism
    Zhou, Yuying
    Zhao, Zhihong
    Yu, Jiangjie
    Sensors and Transducers, 2014, 174 (07): : 103 - 108
  • [25] Key Updating Methods for Combinatorial Design Based Key Management Schemes
    Xu, Chonghuan
    Liu, Weinan
    JOURNAL OF SENSORS, 2014, 2014
  • [26] Design of secure multicast key management schemes with communication budget constraint
    Li, MY
    Poovendran, R
    Berenstein, C
    IEEE COMMUNICATIONS LETTERS, 2002, 6 (03) : 108 - 110
  • [27] A Matrix-Based Pair-Wise Key Establishment for Secure and Energy Efficient WSN-Assisted IoT
    Shukla, Anurag
    Tripathi, Sarsij
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2019, 13 (03) : 91 - 105
  • [28] Trust Based Authentication and Key Establishment for Secure Routing in WMN
    Akilarasu, G.
    Shalinie, S. Mercy
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (12): : 4661 - 4676
  • [29] Chord-based key establishment schemes for sensor networks
    Zhang, Fan
    Shi, Zhijie Jerry
    Wang, Bing
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 731 - 737
  • [30] Key establishment and management for Secure Cellular Machine-to-Machine Communication
    Doh, Inshil
    Lim, Jiyoung
    Li, Shi
    Chae, Kijoon
    2013 SEVENTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS 2013), 2013, : 579 - 584