吉林大学学报(工学版) ›› 2011, Vol. 41 ›› Issue (增刊1): 220-226.

• paper • Previous Articles     Next Articles

Deterministic group-based key pre-distribution scheme for wireless sensor network

PEI Shi-hui1,2, WANG Wei-hong1   

  1. 1. School of Software, Zhejiang University of Technology, Hangzhou 310032, China;
    2. College of Computer Science and Technology, Jilin University, Changchun 130012, China
  • Received:2010-09-25 Online:2011-09-01 Published:2011-09-01

Abstract:

According to the selection of the key ways,the current wireless sensor network key pre-distribution schemes are divided into two kinds of schemes:the probabilistic schemes and the deterministic schemes.To a deterministic scheme,the algorithm is complex,the computationally expensive is large,the size of support network is limited and the key security is vulnerability.A deterministic group-based wireless sensor network key pre-distribution scheme is proposed,which reduced the computational complexity,increased the network scale,and improved the key security.

Key words: wireless sensor networks, security, key pre-distribution, block design

CLC Number: 

  • TP393


[1] Huyen T T N,Mohsen G.An efficient signal-range-b ased probabilistic key predistribution scheme in a wireless sensor network
[J].IEEE Transactions on Vehicular Technology,2009,58(5):2482-2497.

[2] Laurent E,Virgil D G.A key-management schemef or distributed sensor networks
[C] ∥Proceedings oft he9th ACM Conf on Computer and Communications Security.New York:ACM Press,2002:41-47.

[3] Haowen C,Adrian P,Dawn S.Random key predistri-bution schemes for sensor networks
[C] ∥Proceedings of2003IEEE Symp on Research in Security andP rivacy.New York:ACM Press,2003:197-213.

[4] Liu D,Ning P.Establishing pairwise keys in distributed sensor networks
[C] ∥Proceedings of the 10th ACM Conf on Computer and Communications Security.New York:ACM Press,2003:52-61.

[5] 马春光,尚治国,王慧强。基于区域的异构无线传感器网络密钥管理
[J].通信学报,2009,30(5):74-81. Ma Chun-guang,Shang Zhi-guo,Wang Hui-qiang.Domain-based key management for heterogeneous wireless sensor networks
[J].Journal on Communications,2009,30(5):74-81.

[6] 苏忠,林闯,任丰原。无线传感器网络中基于散列链的随机密钥预分发方案
[J].计算机学报,2009,32 (1):30-41. Su Zhong,Lin Chuang,Ren Feng-yuan.Hash chain based random keys pre-distribution scheme in wireless sensor networks
[J].Chinese Journal of Computers,2009,32(1):30-41.

[7] Seyit A & #231;,B & #252;lentY.Combnatorial design of key distribution mechanicsms for wireless sensor networks
[C] ∥Proceedings of the 9th European Symp on Research in Computer Security.Berlin:Springer,2004: 293-308.

[8] Jooyoung L,Douglas R S.Deterministic key predis-tribution schemes for distributed sensor networks
[C] ∥Proceedings of the11the Int'l Workshop on Selected Areas in Cryptography.Berlin:Springer, 2004:1-14.

[9] Wen L D,Jing D.A pairwise key predistributions cheme for wires sensor networks
[C] ∥Proceedingso f the10th ACM Conf on Comer and Communications Security.New York:ACM Press,2003:42-51.

[10] 夏戈明,黄遵国,王志英。基于对称平衡不完全区组设计的无线传感器网络密钥预分配方案
[J].计算机研究与发展,2008,45(1):154-164. Xia Ge-ming,Huang Zun-guo,Wang Zhi-ying.A keyp re-distribution scheme for wireless sensor networks based on the symmetric balanced incomplete block design
[J].Journal of Computer Research and Development,2008,45(1):154-164.

[1] LIU Zhou-zhou, PENG Han. Topology control algorithm based on node reliability in WSN [J]. 吉林大学学报(工学版), 2018, 48(2): 571-577.
[2] LUAN Wen-peng, LIU Yong-lei, WANG Peng, JIN Zhi-gang, WANG Jian. Novel universal security mechanism for energy internet based on trusted platform module [J]. 吉林大学学报(工学版), 2017, 47(6): 1933-1938.
[3] TANG Kun, SHI Rong-hua. Detection of wireless sensor network failure area based on butterfly effect signal [J]. 吉林大学学报(工学版), 2017, 47(6): 1939-1948.
[4] HU Guan-yu, QIAO Pei-li. Chaos covariance matrix adaptation evolution strategy optimization algorithm [J]. 吉林大学学报(工学版), 2017, 47(3): 937-943.
[5] HAN Jia-ling, ZHAO Xiao-hui. Adjustable reversible data hiding algorithm with large embedded capacity based on image gradient prediction [J]. 吉林大学学报(工学版), 2016, 46(6): 2074-2079.
[6] YU He, QIN Gui-he, SUN Ming-hui, YAN Xin, WANG Xuan-zhe. Cyber security and anomaly detection method for in-vehicle CAN [J]. 吉林大学学报(工学版), 2016, 46(4): 1246-1253.
[7] LIU Zhou-zhou, WANG Fu-bao. Improvement of discrete shuffled frog-leaping algorithm and application in compressed sensing reconstruction [J]. 吉林大学学报(工学版), 2016, 46(4): 1261-1268.
[8] ZHANG Jing, LIU Yan-heng, ZHANG Jin-dong, SUN Geng. Cluster size adaptive adjustable strategy for wireless sensor networks [J]. 吉林大学学报(工学版), 2016, 46(3): 876-883.
[9] GE Lin, JI Xin-Sheng, JIANG Tao. Hierarchical situation evaluation model for network information content security incidents [J]. 吉林大学学报(工学版), 2016, 46(2): 556-567.
[10] HU Guan-yu, QIAO Pei-li. High dimensional differential evolutionary algorithm based on cloud population for network security prediction [J]. 吉林大学学报(工学版), 2016, 46(2): 568-577.
[11] SONG Xiao-ying, WEN Tao, GUO Quan, ZHANG Dong-qing, SHENG Gang. Unequal cluster data gathering protocol with optimal cluster size in sensor networks [J]. 吉林大学学报(工学版), 2015, 45(6): 1961-1973.
[12] LEI Wei-jia, ZUO Li-jie, XIE Xian-zhong. Eavesdropping-resistant cooperative relay transmission scheme with partial channel state information [J]. 吉林大学学报(工学版), 2015, 45(5): 1658-1664.
[13] LIU Kui, LIU San-yang. Mobile data collecting algorithm based on mixed sink strategy in WSNs [J]. 吉林大学学报(工学版), 2015, 45(5): 1680-1687.
[14] KUANG Zhe-jun,SHI Wei-jia,HU Liang. Residual energy algorithm of role-relationship and member-relationship based on wireless sensor network [J]. 吉林大学学报(工学版), 2015, 45(2): 600-605.
[15] LIU Yan-heng, LU Ying-qi, SUN Da-yang, WANG Ai-min, NING Yu. Service-oriented generalized WSN lifetime assessment model [J]. 吉林大学学报(工学版), 2014, 44(6): 1771-1777.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!