Volume 35 Issue 9
Sep.  2009
Turn off MathJax
Article Contents
Ding Xiaoyu, Liu Jianwei, Shao Dingronget al. New pairwise key predistribution scheme for wireless sensor networks[J]. Journal of Beijing University of Aeronautics and Astronautics, 2009, 35(9): 1080-1082. (in Chinese)
Citation: Ding Xiaoyu, Liu Jianwei, Shao Dingronget al. New pairwise key predistribution scheme for wireless sensor networks[J]. Journal of Beijing University of Aeronautics and Astronautics, 2009, 35(9): 1080-1082. (in Chinese)

New pairwise key predistribution scheme for wireless sensor networks

  • Received Date: 15 Jul 2008
  • Publish Date: 30 Sep 2009
  • A new hypercube-based key predistribution scheme for establishing pairwise keys between sensor nodes using polynomials, which is parameterized by the dimension of hypercube and the Hamming distance threshold variables was developed. This scheme exhibits a nice property: when the Hamming distance between any two neighboring sensor nodes is less than the pre-defined threshold, the pairwise key can be established directly. The scheme is typical for the innovation that the Hamming distance threshold is parameterized which solves the constraint in previous schemes that any two neighboring nodes can establish pairwise key only when the Hamming distance is one. Extensive performance and security analysis shows that by increasing Hamming distance threshold value, the resilience against node capture attack for higher probability of direct pairwise key establishment can be traded off, so as to save the energy consumption which is the most important issue for sensor networks.

     

  • loading
  • [1] Akyildiz F, Su W, Sankarasubramaniam Y, et al. A survey on sensor networks[J]. IEEE Communications Magazine, 2002, 40(8):102-114 [2] Diffie W, Hellman M E. New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976, 22:644-654 [3] Rivest R L, Shamir A, Adleman L M. A method for obtaining digital signatures and public-key cryptosystems[J]. Communications of the ACM, 1978, 21(2):120-126 [4] Needham Roger M, Schroeder M D. Using encryption for authentication in large networks of computers[J]. Communications of the ACM, 1978, 21(12): 993-999 [5] Perrig A, Szewczyk R, Wen V, et al. SPINS: security protocols for sensor networks[J]. Wireless Networks, 2002, 8: 521-534 [6] Bundo C, Santis A D, Herzberg A, et al. Perfectly-secure key distribution for dynamic conferences [J]. Information and Computation,1998,146(1):1-23 [7] Liu D, Ning P. Establishing pairwise keys in distributed sensor networks //Proceedings of the 10th ACM Conference on Computer and Communication Security.New York:ACM,2003 [8] Liu D, Ning P. Establishing pairwise keys in distributed sensor networks[J]. ACM Transaction Information Systems, 2005, 1:41-77
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(3237) PDF downloads(959) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return