Hash Chains Sensornet: A Key Predistribution Scheme for Distributed Sensor Networks Using Nets and Hash Chains1

نویسندگان

  • Deepak Kumar DALAI
  • Pinaki SARKAR
چکیده

Key management is an essential functionality for a security protocol; particularly for implementations to low cost devices of a distributed sensor networks (DSN)–a prototype of Internet of Things (IoT). Constraints in resources of constituent devices of a low cost IoT (example: sensors of DSN) restricts implementations of computationally heavy public key cryptosystems. This leads to adaptation of the novel key predistribution technique in symmetric key platform to efficiently tackle the key management problem for these resource starved networks. Initial key predistribution schemes (KPS) use random graphs; while later ones exploit combinatorial approaches that assure predictable design properties. Combinatorial designs like a (v, b, r, k)–configuration that forms a μ–CID are effective schemes to design a KPS. A net in a vector space is a set of cosets of certain kind of subspaces called partial spread. A μ(v, b, r, k)–CID can be formed from a net. In this paper, we propose a KPS for DSN, named as Sensornet, using a net. We observe that any deterministic KPS suffer from “smart attack” and hence devise a generic method to eliminate such attacks. Resilience of a KPS can improve by clever application of a Hash Chains technique introduced by Bechkit et al. We improve our Sensornet to obtain a new Hash Chains Sensornet (HC(Sensornet)) by the applications of these two generic methods. Effectiveness of Sensornet and HC(Sensornet) in term of crucial metrics in comparison to prominent schemes has been theoretically established.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Sensornet - A Key Predistribution Scheme for Distributed Sensors using Nets

Key management is an essential functionality for developing secure cryptosystems; particularly for implementations to low cost devices of a distributed sensor networks (DSN)–a prototype of Internet of Things (IoT). Low cost leads to constraints in various resources of constituent devices of a IoT (sensors of a DSN); thereby restricting implementations of computationally heavy public key cryptos...

متن کامل

Two Improvements of Random Key Predistribution for Wireless Sensor Networks

Key distribution is of a critical importance to security of wireless sensor networks (WSNs). Random key predistribution is an acknowledged approach to the key distribution problem. In this paper, we propose and analyze two novel improvements that enhance security provided by the random key predistribution schemes. The first improvement exploits limited length collisions in secure hash functions...

متن کامل

Key Predistribution Scheme for Wireless Sensor Networks with Higher Connectivity

In wireless sensor network (WSN), preditibution of cryptographic keys is possibly the most practical approach to perfect network communications. In this paper, we propose a new secret key predistribution scheme to achieve a higher connectivity in WSN. For this we combine a random key predistribution scheme and hash chain method based on the prior knowledge of sensor node deployment. The propose...

متن کامل

Key Distribution using Double Keyed-hash Chains for Wireless Sensor Networks

As a security primitive, key establishment plays the most crucial role in the designing of the security mechanism in the wireless sensor networks (WSNs). Unfortunately, the resource limitation of sensor nodes poses a great challenge for designing an efficient and effective key establishment scheme for WSNs. In this paper, we propose an effective key predistribution scheme using double keyed-has...

متن کامل

Highly Secure Key Predistribution Using Affine Planes and Reed Muller Codes in Wireless Sensor Networks

Wireless Sensor Networks (WSN) consist of low powered and resource constrained sensor nodes which are left unattended for long duration of time. Hence it is very challenging to design and implement cost effective security protocols for such networks. Thus symmetric key cryptographic techniques are preferred over public key techniques for communication in such scenarios. Prior to deployment, key...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017