Skip to main content

2015 | OriginalPaper | Buchkapitel

A Hierarchical Shared Key Algorithm in Wireless Sensor Networks

verfasst von : Zeyu Sun, Weiguo Wu, Xiaofei Xing, Chuanfeng Li, Yalin Nie, Yangjie Cao

Erschienen in: Algorithms and Architectures for Parallel Processing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless sensor networks (WSNs) are often deployed in hostile environments, thus being subjected to great security risks. However, due to the influence of environment and dynamic topology, the communication radiuses of all nodes are not strictly consistent, which may cause different neighbor numbers and redundant neighbors for each central node. In this paper, we present a key agreement scheme without the trusted third parties by exploiting the special characteristics of Hopfield neural network: the two nodes converge in a steady state from their initial states respectively after iterating finite times, while maintaining the confidentiality of the key by quantifying the key to strings. Compared to existing solutions, the proposed method requires less memory and has lower communication overheads to key agreement.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ang, G., Wei, W., Zhixiao, W., Yan, W.: A hierarchical authentication scheme for the different radio ranges sensor network. In: 2009 International conference on Computational Science and Engineering, pp. 494–501 (2009) Ang, G., Wei, W., Zhixiao, W., Yan, W.: A hierarchical authentication scheme for the different radio ranges sensor network. In: 2009 International conference on Computational Science and Engineering, pp. 494–501 (2009)
2.
Zurück zum Zitat Hailun, T., Sanjay, J., Diet, O., John, Z., Vijay, S.: Secure multi-hop network programming with multiple one-way key chains. In: Proceeding of the First ACM Conference on Wireless Network Security, pp. 206–211 (2008) Hailun, T., Sanjay, J., Diet, O., John, Z., Vijay, S.: Secure multi-hop network programming with multiple one-way key chains. In: Proceeding of the First ACM Conference on Wireless Network Security, pp. 206–211 (2008)
3.
Zurück zum Zitat Ang, G., Wei, W., Zhi, W.: Hopfield-association: establishing a shared key in the wireless sensor networks. In: 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing, pp. 70–73 (2010) Ang, G., Wei, W., Zhi, W.: Hopfield-association: establishing a shared key in the wireless sensor networks. In: 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing, pp. 70–73 (2010)
4.
Zurück zum Zitat Deng, J., Han, R., Mishra, S.: Defending against path-based dos attacks in wireless sensor networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 195–199 (2005) Deng, J., Han, R., Mishra, S.: Defending against path-based dos attacks in wireless sensor networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 195–199 (2005)
5.
Zurück zum Zitat Deb, B., Bhatnagar, S., Nath, B.: ReInForM:Reliable information forwarding using multiple paths in sensor networks. In: 28th Annual IEEE Conference on Local Computer Networks, pp. 350–354 (2003) Deb, B., Bhatnagar, S., Nath, B.: ReInForM:Reliable information forwarding using multiple paths in sensor networks. In: 28th Annual IEEE Conference on Local Computer Networks, pp. 350–354 (2003)
6.
Zurück zum Zitat Heinzelman, W.R., Chandrakasan, A., Balarkrishnan, H.: An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun. 1(4), 36–49 (2002)CrossRef Heinzelman, W.R., Chandrakasan, A., Balarkrishnan, H.: An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun. 1(4), 36–49 (2002)CrossRef
7.
Zurück zum Zitat Chan, H., Perrig, A., Song, D.: Random Key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, pp. 56–67 (2003) Chan, H., Perrig, A., Song, D.: Random Key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, pp. 56–67 (2003)
8.
Zurück zum Zitat Suhas, M., Wade, T., Narayan, M., Chunxuna, Y., Alex, R.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of ACM MobiCom, pp. 236–242 (2008) Suhas, M., Wade, T., Narayan, M., Chunxuna, Y., Alex, R.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of ACM MobiCom, pp. 236–242 (2008)
9.
Zurück zum Zitat Chang, C.C., Chang, Y.F.: Efficient anonymous auction protocol with freewheeling bids. Comput. Secur. 22(8), 728–734 (2003)CrossRef Chang, C.C., Chang, Y.F.: Efficient anonymous auction protocol with freewheeling bids. Comput. Secur. 22(8), 728–734 (2003)CrossRef
10.
Zurück zum Zitat Jiang, R., Pan, L., Li, J.H.: An improvement on efficient anonymous auction protocols. Comput. Secur. 24(2), 169–174 (2005)CrossRef Jiang, R., Pan, L., Li, J.H.: An improvement on efficient anonymous auction protocols. Comput. Secur. 24(2), 169–174 (2005)CrossRef
11.
Zurück zum Zitat Ye, F., Luo, H, Lu, S., Zhang, L.: Statistical route-filtering of injected false data in sensor networks. In: Proceeding IEEE INFOCOM, pp. 453–457 (2004) Ye, F., Luo, H, Lu, S., Zhang, L.: Statistical route-filtering of injected false data in sensor networks. In: Proceeding IEEE INFOCOM, pp. 453–457 (2004)
12.
Zurück zum Zitat Hwang, M.S., Lu, J.L., Lin, C.: Adding timestamps to the electronic auction protocol. Data Knowl. Eng. 40(2), 155–162 (2002)CrossRefMATH Hwang, M.S., Lu, J.L., Lin, C.: Adding timestamps to the electronic auction protocol. Data Knowl. Eng. 40(2), 155–162 (2002)CrossRefMATH
13.
Zurück zum Zitat Horng, T.L., Wen, S.J., Chi, K.L.: An electronic online bidding auction protocol with both security and efficiency. Appl. Math. Comput. 174(2), 1487–1497 (2006)MathSciNetCrossRefMATH Horng, T.L., Wen, S.J., Chi, K.L.: An electronic online bidding auction protocol with both security and efficiency. Appl. Math. Comput. 174(2), 1487–1497 (2006)MathSciNetCrossRefMATH
14.
Zurück zum Zitat Neuman, B.C., Ts’o, T.: Kerberos: an authentication service for computer networks. IEEE Commun. 32(9), 126–135 (1994)CrossRef Neuman, B.C., Ts’o, T.: Kerberos: an authentication service for computer networks. IEEE Commun. 32(9), 126–135 (1994)CrossRef
15.
Zurück zum Zitat Rivest, R.L., Shamir, A., Adleman, M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 489–499 (1982)MathSciNetMATH Rivest, R.L., Shamir, A., Adleman, M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 489–499 (1982)MathSciNetMATH
16.
Zurück zum Zitat Housley, R., Hoffman, P.: Internet X.509 pubic key infrastructure operational protocols: FTP and HTTP. IEEE Commun. 203–227 (1999) Housley, R., Hoffman, P.: Internet X.509 pubic key infrastructure operational protocols: FTP and HTTP. IEEE Commun. 203–227 (1999)
17.
Zurück zum Zitat Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik, A.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of ACM Mobicom 2008, pp. 522–530 (2008) Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik, A.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of ACM Mobicom 2008, pp. 522–530 (2008)
18.
Zurück zum Zitat Xue, F., Kumar, P.R.: The number of neighbors needed for connectivity of wireless networks. Wirel. Netw. 10(2), 1254–1263 (2002) Xue, F., Kumar, P.R.: The number of neighbors needed for connectivity of wireless networks. Wirel. Netw. 10(2), 1254–1263 (2002)
19.
Zurück zum Zitat Perrig, A., Szewczyk, V., Wen, D.C., Tygar, J.D.: SPINS: security protocols for sensor networks. J. Wirel. Netw. 8(5), 521–534 (2002)CrossRefMATH Perrig, A., Szewczyk, V., Wen, D.C., Tygar, J.D.: SPINS: security protocols for sensor networks. J. Wirel. Netw. 8(5), 521–534 (2002)CrossRefMATH
20.
Zurück zum Zitat Savo, G.G.: Optimal Transmission Radius in Sensor Networks. Advanced Wireless Sensor Network: 4G Technologies, pp. 568–571. Wiley, New York (2006) Savo, G.G.: Optimal Transmission Radius in Sensor Networks. Advanced Wireless Sensor Network: 4G Technologies, pp. 568–571. Wiley, New York (2006)
21.
Zurück zum Zitat Whit, D., Martin, H.: New directions in cryptography. IEEE Trans. Inf. Theor. 22(6), 962–977 (2010)MathSciNet Whit, D., Martin, H.: New directions in cryptography. IEEE Trans. Inf. Theor. 22(6), 962–977 (2010)MathSciNet
22.
Zurück zum Zitat Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of ACM CCS 2002, pp. 520–523 (2002) Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of ACM CCS 2002, pp. 520–523 (2002)
23.
Zurück zum Zitat Xu, Y., Heidemann, E.J.: Geography-informed energy conservation for ad hoc routing. In: Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, pp. 56–59 (2001) Xu, Y., Heidemann, E.J.: Geography-informed energy conservation for ad hoc routing. In: Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, pp. 56–59 (2001)
24.
Zurück zum Zitat Liming, S., Guiming, G.: A survey on energy efficient protocols for wireless. Commun. China Comput. Fed. (CCF) 7(4), 13–16 (2002) Liming, S., Guiming, G.: A survey on energy efficient protocols for wireless. Commun. China Comput. Fed. (CCF) 7(4), 13–16 (2002)
Metadaten
Titel
A Hierarchical Shared Key Algorithm in Wireless Sensor Networks
verfasst von
Zeyu Sun
Weiguo Wu
Xiaofei Xing
Chuanfeng Li
Yalin Nie
Yangjie Cao
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-27161-3_36

Premium Partner