Linear Key Predistribution Schemes

نویسندگان

  • Carles Padró
  • Ignacio Gracia
  • Sebastià Martín Molleví
  • Paz Morillo
چکیده

In a key predistribution scheme (KPS), some secret information is distributed among a set of users. This secret information must enable every user in some specified privileged groups to compute a common key associated to that group. Besides, this common key must remain unknown to some coalitions of users outside the privileged group. The information rate, that is, the ratio between the length of the key and the maximum length of the secret information given to the users, is the main parameter to measure the efficiency of a KPS. We present in this poster a general model, based on Linear Algebra techniques, for the design of key predistribution schemes that unifies all previous proposals. This model provides a better understanding of KPS and can be a useful tool for future proposals. Concretely, our model makes easier the verification of the security requirements in a KPS, namely, that every authorised user can obtain the common key associated to a privileged set and no forbidden coalition of non-authorised users obtains any information about that key. We present two methods to construct KPS, and two new families are given by using these methods. Some of the schemes in these families heve better information rates than the KPS in the previous proposals. Some KPS that are suitable for situations that were not previously considered are also found in those families.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Graph-theoretic design and analysis of key predistribution schemes

Key predistribution schemes for resource-constrained networks are methods for allocating symmetric keys to devices in such a way as to provide an efficient trade-off between key storage, connectivity and resilience. While there have been many suggested constructions for key predistribution schemes, a general understanding of the design principles on which to base such constructions is somewhat ...

متن کامل

Strongly Resilient Non-Interactive Key Predistribution For Hierarchical Networks

Key establishment is the basic necessary tool in the network security, by which pairs in the network can establish shared keys for protecting their pairwise communications. There have been some key agreement or predistribution schemes with the property that the key can be established without the interaction ([3], [4], [19]). Recently the hierarchical cryptography and the key management for hier...

متن کامل

Efficient Key Predistribution for Grid-Based Wireless Sensor Networks

In this paper we propose a new key predistribution scheme for wireless sensor networks in which the sensors are arranged in a square grid. We describe how Costas arrays can be used for key predistribution in these networks, then define distinct difference configurations, a more general structure that provides a flexible choice of parameters in such schemes. We give examples of distinct differen...

متن کامل

A Generalised Formula for Calculating the Resilience of Random Key Predistribution Schemes

A commonly used metric for comparing the resilience of key predistribution schemes is fails, which measures the proportion of network connections which are ‘broken’ by an adversary which has compromised s nodes. In ‘Random key predistribution schemes for sensor networks’, Chan, Perrig and Song present a formula for measuring the resilience in a class of random key predistribution schemes called...

متن کامل

A unified approach to combinatorial key predistribution schemes for sensor networks

There have been numerous recent proposals for key predistribution schemes for wireless sensor networks based on various types of combinatorial structures such as designs and codes. Many of these schemes have very similar properties and are analysed in a similar manner. We seek to provide a unified framework to study these kinds of schemes. We derive general formulas for the metrics of the resul...

متن کامل

On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks

Providing security for a wireless sensor network composed of small sensor nodes with limited battery power and memory can be a nontrivial task. A variety of key predistribution schemes have been proposed which allocate symmetric keys to the sensor nodes before deployment. In this paper we examine the role of expander graphs in key predistribution schemes for wireless sensor networks. Roughly sp...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Des. Codes Cryptography

دوره 25  شماره 

صفحات  -

تاریخ انتشار 2002