Journal of Guangxi Normal University(Natural Science Edition) ›› 2013, Vol. 31 ›› Issue (3): 164-168.

Previous Articles     Next Articles

High Safety Scheme of Key Pre-distribution with a Mobile Sink in Wireless Sensor Network

CHEN Yan, WU Wen-kang, LIANG Jun-bin   

  1. College of Computer and Electronic Information,Guangxi University,Nanning Guangxi 530004,China
  • Received:2013-05-03 Online:2013-09-20 Published:2018-11-26

Abstract: In the wireless sensor network with a mobile sink,the mobile sink and the sensors use their shared keys to communicate with each other securely.When some nodes are captured by the adversary,the key information maybe exposed.If each node stores large number of keys,it would reduce the network resilience.Otherwise,it may reduce the network connectivity.In order to solve this problem,this paper proposes a new key pre-distribution scheme,named N-PGPS,which is based on the algorithm of PGPS.This scheme adopts a symmetric polynomial φ(x',y') to produce a perturbed key,which enhances the network resilience effectively.In addition,changing the value of t and s in N-PGPS can also increases the network connectivity observably.The analytical results clearly show that the new schemes perform better in the aspect of network resilience and network connectivity than the existing key pre-distribution schemes in a wireless sensor network with a mobile sink.

Key words: polynomial, key pre-distribution, network resilience, network connectivity

CLC Number: 

  • TP393
[1] 张小莉,易宝林.无线传感器网络中数据流聚集的预处理[J].广西师范大学学报:自然科学版,2007,25(4):168-171.
[2] ESCHENAUER L,GLIGOR V D.A key-management scheme for distributed sensor networks[C]//Proceedings of the 9th ACM Conference on Computer and Communications Security.New York:ACM,2002:41-47.
[3] CHAN Hao-wen,PERRIG A,SONG D.Random key predistribution schemes for sensor networks[C]//Proceedings of 2003 Symposium on Security and Privacy.Los Alamitos,CA:IEEE Computer Society,2003:197-213.
[4] REN Kui,ZENG Kai,LOU Wen-jing.A new approach for random key pre-distribution in large-scale wireless sensor networks[J].Wireless Communications and Mobile Computing,2006,6(3):307-318.
[5] NI Jin-feng,LI Zhou,CHINYA V R.Dealing with random and selective attacks in wireless sensor systems[J].ACM Transactions on Sensor Networks (TOSN),2010,6(2):15.
[6] RUJ S,NAYAK A,STOJMENOVIC I.Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs[C]//Proceedings of 2011 IEEE INFOCOM.Los Alamitos,CA:IEEE Computer Society,2011:326-330.
[7] BLUNDO C,De SANTIS A,HERZBERG A,et al.Perfectly secure key distribution for dynamic conferences[J].Information and Computation,1998,146(1):1-23.
[8] LIU Dong-gang,PENG Ning.Establishing pairwise keys in distributed sensor networks[C]//Proceedings of the 10th ACM Conference on Computer and Communications Security.New York:ACM,2003:52-61.
[9] HU Tong-sen,CHEN Deng,TIAN Xian-zhong.An enhanced polynomial-based key establishment scheme for wireless sensor networks[C]//International Workshop on Education Technology and Training 2008 and 2008 International Workshop on Geoscience and Remote Sensing.Los Alamitos,CA:IEEE Computer Society,2008:809-812.
[10] RASHEED A,MAHAPATRA R.Key predistribution schemes for establishing pairwise keys with a mobile sink in sensor networks[J].IEEE Transactions on Parallel and Distributed Systems,2011,22(1):176-184.
[1] LI Shan-shan, FEI Ming-gang. Hermite Polynomials Related to the Dunkl-Clifford Analysis [J]. Journal of Guangxi Normal University(Natural Science Edition), 2015, 33(4): 73-80.
[2] MENG Shu-hui, YIN Fang-hu, XIE Guang-ming. Graded Extentions of K[x1, x2; x-11,x-12] [J]. Journal of Guangxi Normal University(Natural Science Edition), 2015, 33(1): 74-79.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!