Secure Path Key Establishment Schemes Based on Random Key Management for WSN

被引:2
|
作者
Ahlawat, Priyanka [1 ]
Dave, Mayank [1 ]
机构
[1] Natl Inst Technol, Dept Comp Engn, Kurukshetra, Haryana, India
关键词
Node capture attack; q-Composite scheme; Path key establishment; Random key predistribution scheme; FINDING DISJOINT PATHS; NODE CAPTURE ATTACK; DISTRIBUTED ALGORITHM; SENSOR; PREDISTRIBUTION; EFFICIENT;
D O I
10.1007/s40010-020-00675-z
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
A large number of the path key establishment schemes regard same probability of the node capture attack for each node in the wireless sensor networks. However, in certain critical applications this statement may not be right making such schemes less practical for many real-world applications like border surveillance and disaster management. In this paper, an attack matrix (AM) is designed to calculate the attack coefficient of the sensor nodes at the time of their positioning in the sensor field. The path key exposure problem is minimized by bypassing the nodes with greatest value of attack coefficient. Three attack-resistant path key establishment schemes are presented based on the AM namely attack-resistant proxy-based path key establishment, attack-resistant friend-based path key establishment and attack-resistant disjoint path key establishment. We find that the proposed schemes show improved performance compared to the existing path key establishment schemes. The resistance against node capture of proposed schemes has been verified based on the probability of key recovery and path compromise ratio. The result outcomes prove their expediency in diminishing node capture impact.
引用
收藏
页码:555 / 567
页数:13
相关论文
共 50 条
  • [41] Long-term secure key establishment
    Bohli, Jens-Matthias
    Mueller-Quade, Joern
    Roehrich, Stefan
    LONG-TERM AND DYNAMICAL ASPECTS OF INFORMATION SECURITY: EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, 2007, : 87 - 95
  • [42] Secure Pairwise Key Establishment in Vehicular Networks
    Al-Shareeda, Sarah
    Ozguner, Fusun
    2014 INTERNATIONAL CONFERENCE ON CONNECTED VEHICLES AND EXPO (ICCVE), 2014, : 105 - 111
  • [43] The key authority - Secure key management in hierarchical public key infrastructures
    Wiesmaier, A
    Lippert, M
    Karatsiolis, V
    SAM '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2004, : 89 - 93
  • [44] Secure Authentication and Key Establishment in the SIP Architecture
    Malina, Lukas
    Zukal, Martin
    2011 34TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2011, : 14 - 18
  • [45] Study on secret key management project of WSN based on ECC
    Lu, Ming
    Journal of Networks, 2012, 7 (04) : 652 - 659
  • [46] A New Key Management and Authentication Method for WSN Based on CPK
    Li, Jingjing
    Tan, Le
    Long, Dongyang
    2008 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL 2, PROCEEDINGS, 2008, : 486 - 490
  • [47] WSN Key Management Scheme Based on Fully Bomomorphic Encryption
    Zhang Jing
    Ma Chen
    Fan Hongbo
    2017 29TH CHINESE CONTROL AND DECISION CONFERENCE (CCDC), 2017, : 7304 - 7309
  • [48] Survey on Various Matrix Based Key Management Scheme in WSN
    Abinaya, S.
    Kiruthika, B.
    Ezhilarasie, R.
    Umamakeswari, A.
    RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES, 2015, 6 (03): : 1388 - 1396
  • [49] Key management scheme in WSN based on grid deployment model
    Jiang, Yang
    Sun, Liulin
    Chen, Biyun
    Yuan, Min
    Lecture Notes in Electrical Engineering, 2012, 127 LNEE (VOL. 4): : 623 - 629
  • [50] Key establishment and management for WSNs
    Znaidi, Wassim
    Minier, Marine
    TELECOMMUNICATION SYSTEMS, 2012, 50 (02) : 113 - 125