Entropy Based Intrusion-tolerant Key Management Scheme with Updatability for Unattended Wireless Sensor Network

نویسندگان

  • Tao JIANG
  • Liang-min WANG
چکیده

An Unattended Wireless Sensor Network (UWSN) collects the sensing data by using Mobile Sinks (MSs) which will save the battery power and prolong the network lifetime. Unfortunately, UWSNs are usually deployed in unreachable and hostile environments where MSs, who are given too much privilege, can be easily compromised. This will result in security problems. Thus, their security issues should be carefully addressed to deal with node compromise. In this paper, we present a novel key management scheme employing Blundo symmetric polynomial mechanism and the reverse hash chain to secure UWSNs. From the information entropy perspective, we prove that our scheme is intrusion-tolerant against conspiracy attack of t nodes in every group and show that our scheme is robust against node compromised attacks compared with relative schemes. Streszczenie W niedozorowanych bezprzewodowych sieciach czujnikowych (UWSN) stosuje się zbieranie danych przy pomocy mobilnych stacji (mobile sink,MS). Dzięki temu uzyskuje się oszczędności w poborze mocy baterii oraz wydłużenie czasu życia sieci. UWSN są często umieszczane w niedostępnym i wrogim środowisku, gdzie MS, którym dano za dużo uprawnień, mogą być łatwo skompromitowane. To stwarza problemy bezpieczeństwa, szczególnie starannie rozpatrywane w przypadku kompromitacji węzłów sieci. W opracowaniu, w celu zabezpieczenia UWSN, przedstawiono nowy schemat zarządzania kluczem, wykorzystujący mechanizm symetrycznego wielomianu Blundo i odwrócony ciąg kodowy. Rozpatrując entropię informacji dowiedziono, że, w porównaniu do innych schematów, nasz schemat jest odporny na włamanie wobec ataków na t węzłów w każdej grupie oraz jest silny wobec ataków węzłów skompromitowanych. Entropia opartego o odporny na włamanie schemat zarządzania kluczem z możliwością aktualizacji do niedozorowanej bezprzewodowej sieci czujnikowej

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

متن کامل

A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...

متن کامل

Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design

Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

Securing Cluster-heads in Wireless Sensor Networks by a Hybrid Intrusion Detection System Based on Data Mining

Cluster-based Wireless Sensor Network (CWSN) is a kind of WSNs that because of avoiding long distance communications, preserve the energy of nodes and so is attractive for related applications. The criticality of most applications of WSNs and also their unattended nature, makes sensor nodes often susceptible to many types of attacks. Based on this fact, it is clear that cluster heads (CHs) are ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012