3 research outputs found
Comments on a sensor network key redistribution technique of Cichon, Golebiewski and Kutylowski
Cichon, Golebiewski and Kutylowski (\cite{CGK}) proposed a technique for ``key redistribution\u27\u27 in sensor networks. The idea is that long-term keys held by the sensor nodes are used to encrypt temporal keys that a base station then broadcasts to the network. The temporal keys are used as session keys by the nodes in the sensor network. It is argued that this provides increased connectivity and resilience as compared to a standard Eschenauer-Gligor key predistribution scheme, as well as providing some additional advantages.
In this paper, we provide some simpler proofs of some results from \cite{CGK}. As well, we give a precise analysis of the resilience of Cichon, Golebiewski and Kutylowski\u27s scheme, and we discuss modifications of the scheme based on defining a suitable intersection threshold
Resilience against node capture attack using asymmetric matrices in key predistribution scheme in wireless sensor networks
Wireless Sensor Networks (WSN) usually consists of a large number of tiny sensors with limited
computation capability, memory space and power resource. WSN’s are extremely vulnerable against any kind of
internal or external attacks, due to several factors such as resource constrained nodes and lack of tamperresistant packages. To achieve security in Wireless Sensor Networks, it is important to encrypt messages sent
among sensor nodes. In this paper, we propose a scheme called Modified Bloom’s Scheme (MBS) that uses
asymmetric matrices of keys in place of symmetric matrices in order to establish secret keys between node pairs.
The network resilience against node capture attack is improved using the proposed scheme
Resilience against node capture attack using asymmetric matrices in key predistribution scheme in wireless sensor networks
Wireless Sensor Networks (WSN) usually consists of a large number of tiny sensors with limited computation capability, memory space and power resource. WSN's are extremely vulnerable against any kind of internal or external attacks, due to several factors such as resource constrained nodes and lack of tamperresistant packages. To achieve security in Wireless Sensor Networks, it is important to encrypt messages sent among sensor nodes. In this paper, we propose a scheme called Modified Bloom's Scheme (MBS) that uses asymmetric matrices of keys in place of symmetric matrices in order to establish secret keys between node pairs. The network resilience against node capture attack is improved using the proposed scheme.[PUBLICATION ABSTRACT