Secure Path Key Establishment Schemes Based on Random Key Management for WSN

被引:2
|
作者
Ahlawat, Priyanka [1 ]
Dave, Mayank [1 ]
机构
[1] Natl Inst Technol, Dept Comp Engn, Kurukshetra, Haryana, India
关键词
Node capture attack; q-Composite scheme; Path key establishment; Random key predistribution scheme; FINDING DISJOINT PATHS; NODE CAPTURE ATTACK; DISTRIBUTED ALGORITHM; SENSOR; PREDISTRIBUTION; EFFICIENT;
D O I
10.1007/s40010-020-00675-z
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
A large number of the path key establishment schemes regard same probability of the node capture attack for each node in the wireless sensor networks. However, in certain critical applications this statement may not be right making such schemes less practical for many real-world applications like border surveillance and disaster management. In this paper, an attack matrix (AM) is designed to calculate the attack coefficient of the sensor nodes at the time of their positioning in the sensor field. The path key exposure problem is minimized by bypassing the nodes with greatest value of attack coefficient. Three attack-resistant path key establishment schemes are presented based on the AM namely attack-resistant proxy-based path key establishment, attack-resistant friend-based path key establishment and attack-resistant disjoint path key establishment. We find that the proposed schemes show improved performance compared to the existing path key establishment schemes. The resistance against node capture of proposed schemes has been verified based on the probability of key recovery and path compromise ratio. The result outcomes prove their expediency in diminishing node capture impact.
引用
收藏
页码:555 / 567
页数:13
相关论文
共 50 条
  • [31] Key Management Schemes for Secure Group Communication in Wireless Networks - A Survey
    Renugadevi, N.
    Swaminathan, G.
    Kumar, Aditya S.
    2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 446 - 450
  • [32] On Identity-Based-Like Non-Interactive Key Establishment for Key Predistribution Schemes
    Urivskiy, Alexey
    PROCEEDINGS OF THE 2020 SEVENTEENTH INTERNATIONAL WORKSHOP ON ALGEBRAIC AND COMBINATORIAL CODING THEORY ALGEBRAIC AND COMBINATORIAL CODING THEORY (ACCT 2020): PROCEEDINGS OF THE SEVENTEENTH INTERNATIONAL WORKSHOP ON ALGEBRAIC AND COMBINATORIAL CODING THEORY ACCT 2020, 2020, : 150 - 155
  • [33] On session key construction in provably-secure key establishment protocols
    Choo, KKR
    Boyd, C
    Hitchcock, Y
    PROGRESS IN CRYPTOLOGY - MYCRYPT 2005, 2005, 3715 : 116 - 131
  • [34] Using auxiliary sensors for pairwise key establishment in WSN
    Dong, Qi
    Liu, Donggang
    NETWORKING 2007: AD HOC AND SENSOR NETWORKS, WIRELESS NETWORKS, NEXT GENERATION INTERNET, PROCEEDINGS, 2007, 4479 : 251 - +
  • [35] Using Auxiliary Sensors for Pairwise Key Establishment in WSN
    Dong, Qi
    Liu, Donggang
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2012, 11 (03)
  • [36] An Efficient Authentication Protocol and Key Establishment in Dynamic WSN
    Abd El Dayem, Sanaa. S.
    Rizk, M. R. M.
    Mokhtar, M. A.
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND MANAGEMENT (ICICM 2016), 2016, : 178 - 182
  • [37] Hybrid Key Management Scheme for WSN
    Zhao, Nannan
    Yao, Jianbo
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 424 - 430
  • [38] An efficient key management scheme for WSN
    Hu, Liu Jian
    Wei, Jiang Jian
    2010 INTERNATIONAL CONFERENCE ON THE DEVELOPMENT OF EDUCATIONAL SCIENCE AND COMPUTER TECHNOLOGY, 2010, : 405 - 407
  • [39] A Lightweight and Security Key Management for WSN
    Xie, Bin
    Zhang, Li
    Jin, Yuquan
    Huang, Dan
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON INTELLIGENT CONTROL AND COMPUTER APPLICATION, 2016, 30 : 470 - 476
  • [40] A resilient and seamless rekeying scheme based on random key distribution for WSN
    Ahlawat, Priyanka
    Dave, Mayank
    2017 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS AND ELECTRONICS (COMPTELIX), 2017, : 321 - 327