Chen Gang, Zhang Jinbai, Lee Chun-Hianet al. Numerical simulation of external MHD generator on board reentry vehicles[J]. Journal of Beijing University of Aeronautics and Astronautics, 2010, 36(2): 135-139. (in Chinese)
Citation: Ding Xiaoyu, Liu Jianwei, Shao Dingronget al. New pairwise key predistribution scheme for wireless sensor networks[J]. Journal of Beijing University of Aeronautics and Astronautics, 2009, 35(9): 1080-1082. (in Chinese)

New pairwise key predistribution scheme for wireless sensor networks

  • Received Date: 15 Jul 2008
  • Publish Date: 30 Sep 2009
  • A new hypercube-based key predistribution scheme for establishing pairwise keys between sensor nodes using polynomials, which is parameterized by the dimension of hypercube and the Hamming distance threshold variables was developed. This scheme exhibits a nice property: when the Hamming distance between any two neighboring sensor nodes is less than the pre-defined threshold, the pairwise key can be established directly. The scheme is typical for the innovation that the Hamming distance threshold is parameterized which solves the constraint in previous schemes that any two neighboring nodes can establish pairwise key only when the Hamming distance is one. Extensive performance and security analysis shows that by increasing Hamming distance threshold value, the resilience against node capture attack for higher probability of direct pairwise key establishment can be traded off, so as to save the energy consumption which is the most important issue for sensor networks.

     

  • [1] Akyildiz F, Su W, Sankarasubramaniam Y, et al. A survey on sensor networks[J]. IEEE Communications Magazine, 2002, 40(8):102-114 [2] Diffie W, Hellman M E. New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976, 22:644-654 [3] Rivest R L, Shamir A, Adleman L M. A method for obtaining digital signatures and public-key cryptosystems[J]. Communications of the ACM, 1978, 21(2):120-126 [4] Needham Roger M, Schroeder M D. Using encryption for authentication in large networks of computers[J]. Communications of the ACM, 1978, 21(12): 993-999 [5] Perrig A, Szewczyk R, Wen V, et al. SPINS: security protocols for sensor networks[J]. Wireless Networks, 2002, 8: 521-534 [6] Bundo C, Santis A D, Herzberg A, et al. Perfectly-secure key distribution for dynamic conferences [J]. Information and Computation,1998,146(1):1-23 [7] Liu D, Ning P. Establishing pairwise keys in distributed sensor networks //Proceedings of the 10th ACM Conference on Computer and Communication Security.New York:ACM,2003 [8] Liu D, Ning P. Establishing pairwise keys in distributed sensor networks[J]. ACM Transaction Information Systems, 2005, 1:41-77
  • Relative Articles

    [1]LYU Y,ZHOU R,LI X,et al. A heterogeneous multi-task assignment algorithm based on multi-round distributed auction[J]. Journal of Beijing University of Aeronautics and Astronautics,2025,51(3):1018-1027 (in Chinese). doi: 10.13700/j.bh.1001-5965.2023.0156.
    [2]CHEN Mei, TANG ShengZhou, WEI LiLei, YOU YuanYuXiu. A Cluster Backbone Clustering Algorithm Based on Variable Truncation Distance[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2024.0918
    [3]DING L,HU Z W,GUO X D,et al. Test research on icing characteristics of sensors and their influence laws[J]. Journal of Beijing University of Aeronautics and Astronautics,2025,51(1):152-160 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.1026.
    [4]HUANG Mengdie, WANG Lufeng, HUANG Xuxing, LI Shuang. Space target collision risk analysis algorithm based on the square Mahalanobis distance[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2024.0167
    [5]ZHOU Y J,WAN Q,XU Y Z,et al. Redundancy design of a FADS system on a complex leading-edge vehicle using neural network approach[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(3):757-764 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0341.
    [6]LIU H B,SHI X M,QU J B,et al. Design of Bayesian acceptance scheme for missile hit accuracy based on multinomial distribution[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(6):1991-2000 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0516.
    [7]CHEN Zhao, LIU Zechao. Self-supervised optical fiber sensing signal separation based on linear convolutive mixing process[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2024.0409
    [8]SHI C P,HE H F,HE Y M,et al. Joint estimation of DOA and polarization parameters based on uniform circle array with vector sensor[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(4):1325-1335 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0390.
    [9]WANG B,LI Y W,WANG K. Design of a low cost chipless RFID humidity sensor[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(3):1047-1052 (in Chinese). doi: 10.13700/j.bh.1001-5965.2023.0161.
    [10]CAI Z H,CHEN W J,ZHAO J,et al. Object detection and obstacle avoidance based on dynamic vision sensor for UAV[J]. Journal of Beijing University of Aeronautics and Astronautics,2024,50(1):144-153 (in Chinese). doi: 10.13700/j.bh.1001-5965.2022.0201.
    [11]CHEN Yong, ZHANG Bingwang, XIN Zhaofeng. A scheme for high-speed railway train-to-ground authentication and key agreement based on lattice theory[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2024.0470
    [12]GE Wenqing, LI Detong, SONG Yadong, TAN Cao, LI Bo. Displacement sensorlesscontrol of electromagnetic linear actuator based on improved sliding mode observer[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2024.0291
    [13]MAO Qinghua, ZHAO Bing, LI Yang. CHAOS ephemeran algorithm combining polynomial difference learning and dimensional variation[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2023.0698
    [14]ZHAO J Y,HU J,YAO J Y,et al. EHA fault diagnosis and fault tolerant control based on adaptive neural network robust observer[J]. Journal of Beijing University of Aeronautics and Astronautics,2023,49(5):1209-1221 (in Chinese). doi: 10.13700/j.bh.1001-5965.2021.0416.
    [15]RAN Hua-ming. Airborne sensor multi-task scheduling algorithm based on slide time window[J]. Journal of Beijing University of Aeronautics and Astronautics. doi: 10.13700/j.bh.1001-5965.2023.0488
    [16]LI C H,MA J,YANG Y J,et al. Adaptively robust multi-sensor fusion algorithm based on square-root cubature Kalman filter[J]. Journal of Beijing University of Aeronautics and Astronautics,2023,49(1):220-228 (in Chinese). doi: 10.13700/j.bh.1001-5965.2021.0201.
    [17]REN J,LI M H,DU Y,et al. Identity-based authentication key agreement protocol for horizontal federated learning environment[J]. Journal of Beijing University of Aeronautics and Astronautics,2023,49(2):397-405 (in Chinese). doi: 10.13700/j.bh.1001-5965.2021.0217.
    [18]FU H Q,WU S F,LIU M L,et al. Disturbance-observer based adaptive control for space inertial sensor[J]. Journal of Beijing University of Aeronautics and Astronautics,2023,49(10):2799-2806 (in Chinese). doi: 10.13700/j.bh.1001-5965.2021.0734.
    [19]HAN X,WANG Y X,CHENG X C,et al. A decentralized multi-sensor fusion estimator using finite memory buffers[J]. Journal of Beijing University of Aeronautics and Astronautics,2023,49(2):335-343 (in Chinese). doi: 10.13700/j.bh.1001-5965.2021.0240.
    [20]WU Xin, WU Youli, NIU Deqing, CAI Yuxuan, XU Yang, CHEN Bian. Application of data cube association mining in infrared anti-jamming[J]. Journal of Beijing University of Aeronautics and Astronautics, 2022, 48(11): 2304-2313. doi: 10.13700/j.bh.1001-5965.2021.0096
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(3339) PDF downloads(960) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return