上海交通大学学报(英文版) ›› 2013, Vol. 18 ›› Issue (3): 376-384.doi: 10.1007/s12204-013-1408-z
• 论文 • 上一篇
XU Li-qing (许丽卿), CHEN Hao* (陈 豪)
出版日期:
2013-06-28
发布日期:
2013-08-12
通讯作者:
CHEN Hao (陈 豪)
E-mail:haochen@sei.ecnu.edu.cn
XU Li-qing (许丽卿), CHEN Hao* (陈 豪)
Online:
2013-06-28
Published:
2013-08-12
Contact:
CHEN Hao (陈 豪)
E-mail:haochen@sei.ecnu.edu.cn
摘要:
Key establishment is the basic step for the wireless sensor network (WSN) security. The polynomial based key predistribution scheme of Blom and Blundo et al. has been the basic ingredient for the key establishment for WSNs. It is tempting to use many random and different instances of polynomial based key predistribution scheme for various parts of the WSN to enhance the efficiency of WSN key establishment protocols. This paper indicates that it is not secured in general to use many instances of Blom-Blundo et al. polynomial based key predistribution scheme in a WSN key establishment protocol. Thus the previously constructed group-based type WSN key predistribution schemes using polynomial based key predistribution scheme are insecure. We propose new generalized Blom-Blundo et al. key predistribution schemes. These new generalized Blom-Blundo et al. key predistribution schemes can be used many times in one WSN key establishment protocol with only a small increase of cost. The application to group-based WSN key predistribution schemes is given.
中图分类号:
XU Li-qing (许丽卿), CHEN Hao* (陈 豪). Can the Polynomial Based Key Predistribution Scheme Be Used Many Times in One Wireless Sensor Network Key Establishment Protocol?[J]. 上海交通大学学报(英文版), 2013, 18(3): 376-384.
XU Li-qing (许丽卿), CHEN Hao* (陈 豪). Can the Polynomial Based Key Predistribution Scheme Be Used Many Times in One Wireless Sensor Network Key Establishment Protocol?[J]. Journal of shanghai Jiaotong University (Science), 2013, 18(3): 376-384.
[1] Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks [C]//IEEE Symposium on Security and Privacy. Oakland, USA: IEEE, 2003: 197-213. [2] Delgosha F, Fekri F. Threshold key-establishment in distributed sensor networks using a multivariate scheme [C]//Proceedings of the 25th Conference on Computer Communications (IEEE INFOCOM). Barcelona, Spain: IEEE, 2006: 1-12. [3] Du W, Deng J, Han Y S, et al. A pairwise key predistribution scheme for wireless sensor networks [J]. ACM Transactions on Information and System Security, 2005, 8(2): 228-258. [4] Eschenauer L, Gligor V D. A keymanagement scheme for distributed sensor networks [C]//Proceedings of the 9th ACM Conference on Computer and Communications Security. Washington, DC, USA: ACM, 2002: 41-47. [5] Liu D, Ning P. Establishing pairwise keys in distributed sensor networks [C]//Proceedings of the 10th ACM Conference on Computer and Communications Security. Washington, DC, USA: ACM, 2003: 52-61. [6] Liu D, Ning P, Li R. Establishing pairwise keys in distributed sensor networks [J]. ACM Transactions on Information and System Security, 2005, 8(1): 41-77. [7] Liu D, Ning P, Du W. Group-based key predistribution for wireless sensor networks [J]. ACM Transactions on Sensor Networks, 2008, 4(2): 1-14. [8] Liu D, Ning P. Location-based pairwise key establishments for static sensor networks [C]//ACM Workshop on Security in Ad Hoc and Sensor Networks. New York, USA: ACM, 2003: 72-82. [9] Perrig A, Stankovic J, Wagner D. Security in wireless sensor networks [J]. Communications of the ACM, 2004, 47(6): 53-57. [10] Zhang W, Subramanian N, Wang G. Lightweight and compromisingresilie message authentication in sensor networks [C]//Proceedings of the 27th Conference on Computer Communications (IEEE INFOCOM). Phoenix, USA: IEEE, 2008: 1418-1426. [11] Zhang W, Cao G. Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach [C]//Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Miami, USA: IEEE, 2005: 503-514. [12] Zhu S, Setia S, Jajodia S. LEAP: Efficient security mechanisms for large-scale distributed sensor networks [C]//Proceedings of the 10th ACM Conference on Computer and Communications Security. Washington, DC, USA: ACM, 2003: 62-72. [13] Perrig A, Szewezyk R, Wen V, et al. Spins: Security protocols for sensor networks [C]//Proceedings of the 7th Annual International Conference on Mobile Computing and Networks. Rome, Italy: ACM, 2001: 189-199. [14] Blom R. An optimal class of symmetric key generation systems [J]. Advances in Cryptology, Eurocrypt’84, Lecture Notes in Computer Science, 1985, 209: 335-338. [15] Blundo C, de Santis A, Herzberg A, et al. Perfectly-secure key distribution for dynamic conferences [J]. Advances in Cryptology, Crypto ’92, Lecture Notes in Computer Science, 1993, 740: 471-486. [16] Albrecht M, Gentry C, Halevi S, et al. Attacking cryptographic schemes based on perturbation polynomials [C]//Proceedings of the 16th ACM Conference on Computer and Communications Security. Chicago, USA: ACM, 2009: 1-10. [17] Yu Z, Guan Y. A robust group-based key management scheme for wireless sensor networks [C]//Proceedings of IEEE Wireless Communications and Networking Conference. NewOrleans, USA: IEEE, 2005, 4: 1915-1920. |
[1] | LIN Heyun (林和昀), YUAN Chaowei (袁超伟), DU Jianhe (杜建和), HU Zhongwei (胡仲伟). Tensor-Based Joint Channel Estimation and Symbol Detection for AF MIMO Relay Networks[J]. Journal of Shanghai Jiao Tong University (Science), 2020, 25(1): 88-96. |
[2] | GE Jia (葛佳), QIU Mengting (邱梦婷), YU Hui* (俞晖). Joint Optimization of Spectral and Energy Efficiency for Multi-Pair Full-Duplex Two-Way Relay Networks with Imperfect Channel State Information[J]. 上海交通大学学报(英文版), 2017, 22(2): 161-166. |
[3] | . [J]. Journal of Shanghai Jiao Tong University(Science), 2015, 20(6): 654-659. |
[4] | HUANG Zheng-yong* (黄正勇), YU Hui (俞 晖), GUAN Yun-feng (管云峰), CHEN Kun (陈 坤). Indoor Localization with a Crowdsourcing Based Fingerprints Collecting[J]. 上海交通大学学报(英文版), 2015, 20(5): 548-557. |
[5] | WANG Rui (王睿), JI Hong (纪红), LI Xi*(李曦). A Distributed Power Allocation Scheme in Green Cognitive Radio Ad Hoc Networks[J]. 上海交通大学学报(英文版), 2015, 20(2): 195-201. |
[6] | BHASKAR Subbe Gowda1*, SATISH KUMAR Gandluru Arthur Edwin2, RAMANA REDDY Patil3. Design and Analysis of an Adaptive Handover Protocol for 4G Networks[J]. 上海交通大学学报(英文版), 2015, 20(2): 209-217. |
[7] | LI Meng-shi* (李孟实), YU Hui (俞 晖), LUO Han-wen (罗汉文), XU You-yun (徐友云). Pragmatic Physical Layer Abstraction Method Based on Bit-LLR-Wise Exponential Effective SNR Mapping for Bit Interleaved Coded Orthogonal Frequency Division Multiplexing System[J]. 上海交通大学学报(英文版), 2014, 19(2): 173-180. |
[8] | LI He1 (李 鹤), GAN Xiao-ying1,2* (甘小莺), CHEN Shi-yang1 (陈时阳), FENG Xin-xin1 (冯心欣). Multi-Channel Spectrum Sensing in Cognitive Ad-hoc Networks: An Energy-Efficient Manner[J]. 上海交通大学学报(英文版), 2013, 18(5): 513-519. |
[9] | ZHOU Bao-long1,2* (周宝龙), JIANG Ling-ge1 (蒋铃鸽), HE Chen1 (何 晨). Robust Ergodic Rate Transmission for Time Division Duplex Beamforming Systems[J]. 上海交通大学学报(英文版), 2013, 18(5): 535-541. |
[10] | QIAN Cheng* (钱成), ZHANG Meng (张萌), LUO Han-wen (罗汉文), LIU Wei (刘伟). Joint Tomlinson-Harashima Source and Linear Relay Precoder Design in Amplify-and-Forward Multiple-Input Multiple-Output Two-Way Relay Systems [J]. 上海交通大学学报(英文版), 2013, 18(2): 180-185. |
阅读次数 | ||||||||||||||||||||||||||||||||||||||||||||||||||
全文 441
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||
摘要 842
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||