LU Decomposition-Based Key Predistribution Scheme for Heterogeneous Wireless Sensor Networks
نویسندگان
چکیده
Since LU decomposition-based key predistribution schemes can be compressed easily, they are very appropriate for source-limited sensor networks. But existing schemes have two flaws: (1) they all focus on key establishment without considering key or key material update, thus they can’t support extra nodes addition or deletion and their supported network size is limited; (2) they are vulnerable to LU attack. To conquer those drawbacks, a new LU decomposition-based key predistribution scheme for clustered heterogeneous sensor networks is proposed. Our scheme applies perturbation technology on matrices which are generated by LU decomposition, and establishes common bit-string between nodes by exchanging public vectors. These common bit-strings shared by nodes are randomly truncated and catenated one by one to form pairwise keys. When new nodes arrive or old nodes leave, this scheme updates key materials quickly by exploiting LU attack principle. Security and performance analysis show that our proposed scheme is feasible for sensor networks and has following two advantages: (1) It is robust to eavesdropping attack, Albrecht’s attack, LU attack and node capture attack; (2) It supports efficient key update for adding and deleting nodes while keeping original information about private matrix in secret.
منابع مشابه
A novel key management scheme for heterogeneous sensor networks based on the position of nodes
Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...
متن کاملA Secure Scheme for Heterogeneous Wireless Sensor Networks
A secure scheme for heterogeneous wireless sensor networks is presented. The wireless sensor networks have some sensor nodes and heterogeneous sensor nodes that have greater power and transmission capability than other nodes have. All kinds of sensor nodes are evenly distributed respectively in entire sensing area that is divided into a number of same cells and logical groups evenly. The pairwi...
متن کاملLPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring
Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...
متن کاملHybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design
Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...
متن کاملKey Predistribution Scheme for Clustered Hierarchical Wireless Sensor Networks based on Combinatorial Designs
Combinatorial designs are powerful mathematical tools with comprehensive and simple algebraic structures. Recently, many researchers have used combinatorial designs as key predistribution schemes in wireless sensor networks (WSNs). Previous studies on security of WSNs are mainly concentrated on those networks containing nodes with the same capabilities. Further, investigations reveal that high ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- J. Inf. Sci. Eng.
دوره 30 شماره
صفحات -
تاریخ انتشار 2014