Advanced Search
Volume 31 Issue 7
Dec.  2010
Turn off MathJax
Article Contents
Xu Li, Zhang Hong-yan, Shen Jin-bo. Pair-wise Key Establishment Scheme Based on Transerval Design in Clustered Sensor Networks[J]. Journal of Electronics & Information Technology, 2009, 31(7): 1600-1605. doi: 10.3724/SP.J.1146.2008.00564
Citation: Xu Li, Zhang Hong-yan, Shen Jin-bo. Pair-wise Key Establishment Scheme Based on Transerval Design in Clustered Sensor Networks[J]. Journal of Electronics & Information Technology, 2009, 31(7): 1600-1605. doi: 10.3724/SP.J.1146.2008.00564

Pair-wise Key Establishment Scheme Based on Transerval Design in Clustered Sensor Networks

doi: 10.3724/SP.J.1146.2008.00564
  • Received Date: 2008-05-08
  • Rev Recd Date: 2009-03-16
  • Publish Date: 2009-07-19
  • Due to the limited energy, small storage room and so on, the traditional network key management scheme is challenged. Based on the transerval design,bivariable polynomial and threshold strategy, a new pairwise key establishment scheme and multi-path key construction strategy suit to clustered wireless sensor network is proposed. By this scheme and transerval design, the nodes in the same cluster can directly construct pair-wise key and the nodes in the different clusters can construct path key based on threshold strategy. Theory and simulation analysis indicate that the new scheme can not only increase the security, connectivity and vulnerability, but also decrease the communication overload and storage cost. The scalability is another good character.
  • loading
  • Akyildiz F, Su W, Sankarasubra maniam Y, and Cayirci E.Wireless sensor network: A survey[J].Computer Networks.2002,38(4):393-422[2]Eschenauer L and Gligor V. A key management schemedistributed sensor network. Proceeding of the 9th ACMConference on Computer and Communications Security,Washington. New York: ACM Press, 2002: 41-47.[3]Chan H and Perrig A, et al.. Random key predistributionschemes for sensor networks. Proceeding of the 2003 IEEESymposium on Security and Privacy, Berkeley, California.IEEE Computer Society, 2003: 197-213.[4]Camtepe S A and Yener B. Combinatorial design of keydistribution mechanisms for wireless sensor networks.Proceeding of 9th European Symposium On Research inComputer Security, Berlin. Springer-Verlag, 2004: 293-308.[5]Hongmei Deng and Anindo Mukherjee, et al.. Threshold andidentity-based key management and authentication forwireless ad hoc networks[J].Porceeding of internationalconference on information technology: coding andcomputing(ITCC04), Washington. IEEE Computer Society.2004, 2:107-111[6]Farshid delgosha and Faramarz fekri. Threshold keyestablishmentin distributed sensor networks using amultivariate scheme. Proceeding of 25th IEEE InternationalConference on Compute Communications, Barcelona,Catalunya, Spain. April, 2006: 1-12.[7]Chen Jiangwei, Xu Li, and Mu Yi. A new group Rekeyingscheme based on t-packing designs for Ad hoc networks.Proceeding of the 2nd international conference on Scalableinformation systems, Suzhou, China, ACM Press, 2007, 304:110-115.[8]许力, 郑宝玉. MANET 环境下基于能量保护的路由策略及其研究进展[J].电子与信息学报.2005, 27(5):827-834浏览[9]Erdos P and Renyi A. On random graph. Published inMathematics. Debrecen. Hungary, 6. 1959: 290-297.[10]Liu D and Ning P. Establishing pairwise keys in distributedsensor networks. Proceeding of the 10th ACM Conference onComputer and Communications Security, Washington. NewYork: ACM Press, 2003: 52-61.[11]章静, 许力, 黄榕宁. 自组网中基于可信度的分簇策略. 第二届中国可信计算与信息安全学术会议, 中国石家庄. 武汉大学学报(理学版), 2006, 52(S1): 1-4.Zhang Jing, Xu Li, and Huang Rong-ning. Trustevaluation-based clustering algorithm in an ad hoc network.Proceeding of 2nd China Trusted Computing andInformation Security Conference, Shijiazhuang, China.Journal Wuhan University(Natural Science Edition), 2006,52(S1): 1-4.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3361) PDF downloads(845) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return