Skip to main content
Erschienen in: Wireless Personal Communications 1/2018

04.11.2017

An Authentication Key Establish Protocol for WSNs Based on Combined Key

verfasst von: Qikun Zhang, Junling Yuan, Ge Guo, Yong Gan, Jianwei Zhang

Erschienen in: Wireless Personal Communications | Ausgabe 1/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Advances in lattice-based cryptography are enabling the use of public key algorithms (PKAs) in power-constrained ad hoc and sensor network devices. Unfortunately, while many wireless networks are dominated by group communications, PKAs are inherently unicast—i.e., public/private key pairs are generated by data destinations. To fully realize public key cryptography in these networks, lightweight PKAs should be augmented with energy efficient mechanisms for group key agreement. Recently, many key management schemes for the WSNs have been proposed, but the computation and communication costs of these protocols are too high to suitable for WSNs. This paper proposes a key establish protocol for the WSNs based on combined key. The protocol adopts seed key mapping technology to achieve two-party and multi-party key establish in the WSNs, it can generate a large number of combination keys with little resources. So it effectively solve the contradiction between the sensor nodes need large storage space to store shared key with their neighbors and their limited storage space. It can also achieve mutual authentication between nodes when they establish shared key. Analysis shows that the proposed protocol has the advantages in storage efficiency, computation consumption and Communication consumption and suitable for wireless networks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Fanian, A., & Berenjkoub, M. (2012). An efficient end to end key establishment protocol for wireless sensor networks. In 9th international ISC conference on information security and cryptology (ISCISC) (pp. 73–79). Fanian, A., & Berenjkoub, M. (2012). An efficient end to end key establishment protocol for wireless sensor networks. In 9th international ISC conference on information security and cryptology (ISCISC) (pp. 73–79).
2.
Zurück zum Zitat Znaidi, W., & Minier, M. (2012). Key establishment and management for WSNs. Telecommunication Systems, 50(2), 113–125.CrossRef Znaidi, W., & Minier, M. (2012). Key establishment and management for WSNs. Telecommunication Systems, 50(2), 113–125.CrossRef
3.
Zurück zum Zitat Li, M., Yu, S., Guttman, J. D., Lou, W., & Ren, K. (2013). Secure ad hoc trust initialization and key management in wireless body area networks. ACM Transactions on Sensor Networks, 9(2), 18.CrossRef Li, M., Yu, S., Guttman, J. D., Lou, W., & Ren, K. (2013). Secure ad hoc trust initialization and key management in wireless body area networks. ACM Transactions on Sensor Networks, 9(2), 18.CrossRef
4.
Zurück zum Zitat Li, Y., Chen, D., Li, W., Wang, G., & Smith, P. (2013). A hybrid authenticated group key agreement protocol in wireless sensor networks. International Journal of Distributed Sensor Networks, 9(4), 1–14.CrossRef Li, Y., Chen, D., Li, W., Wang, G., & Smith, P. (2013). A hybrid authenticated group key agreement protocol in wireless sensor networks. International Journal of Distributed Sensor Networks, 9(4), 1–14.CrossRef
5.
Zurück zum Zitat Yang, G., Wang, J. T., et al. (2007). A key establish scheme for WSN based on IBE and Diffie–Hellman algorithms. Chinese Journal of Electrics, 35(1), 180–184. Yang, G., Wang, J. T., et al. (2007). A key establish scheme for WSN based on IBE and Diffie–Hellman algorithms. Chinese Journal of Electrics, 35(1), 180–184.
6.
Zurück zum Zitat Shi, W., & Zhang, Z. (2012). Fuzzy identity-based key agreement scheme for wireless sensor networks. International Journal of Advancements in Computing Technology, 4(2), 222–230.CrossRef Shi, W., & Zhang, Z. (2012). Fuzzy identity-based key agreement scheme for wireless sensor networks. International Journal of Advancements in Computing Technology, 4(2), 222–230.CrossRef
7.
Zurück zum Zitat Jeong, Y.-S., Hwang, Y.-C., Kim, G.-S., Lee, S.-H. (2007). Key pre-distribution scheme for little storage space and strong security strength in large-scale wireless sensor network. In International conference on convergence information technology (pp. 1572–1577). Jeong, Y.-S., Hwang, Y.-C., Kim, G.-S., Lee, S.-H. (2007). Key pre-distribution scheme for little storage space and strong security strength in large-scale wireless sensor network. In International conference on convergence information technology (pp. 1572–1577).
8.
Zurück zum Zitat Shan, T.-H., Liu, C.-M., (2008). Enhancing the key pre-distribution scheme on wireless sensor networks. In The 2008 IEEE Asia–Pacific services computing conference (pp. 1127–1131). Shan, T.-H., Liu, C.-M., (2008). Enhancing the key pre-distribution scheme on wireless sensor networks. In The 2008 IEEE Asia–Pacific services computing conference (pp. 1127–1131).
9.
Zurück zum Zitat Li, X., Shen, J., (2009). A novel key pre-distribution scheme using one-way hash chain and bivariate polynomial for wireless sensor networks. In The 3rd international conference on anti-counterfeiting, security, and identification in communication (pp. 575–580). Li, X., Shen, J., (2009). A novel key pre-distribution scheme using one-way hash chain and bivariate polynomial for wireless sensor networks. In The 3rd international conference on anti-counterfeiting, security, and identification in communication (pp. 575–580).
10.
Zurück zum Zitat Gaur, A., Toshniwal, S., Prakash, A., & Agrawal, D. P. (2010). Enhanced location based key pre-distribution scheme for secure communication in wireless sensor network (WSN). In 2010 IEEE 7th international conference on mobile ad hoc and sensor systems (MASS) (pp. 552–557). Gaur, A., Toshniwal, S., Prakash, A., & Agrawal, D. P. (2010). Enhanced location based key pre-distribution scheme for secure communication in wireless sensor network (WSN). In 2010 IEEE 7th international conference on mobile ad hoc and sensor systems (MASS) (pp. 552–557).
11.
Zurück zum Zitat Martin, K. M. (2009). On the applicability of combinatorial designs to key pre-distribution for wireless sensor networks. Lecture Notes in Computer Science, 5557, 124–145.CrossRefMATH Martin, K. M. (2009). On the applicability of combinatorial designs to key pre-distribution for wireless sensor networks. Lecture Notes in Computer Science, 5557, 124–145.CrossRefMATH
12.
Zurück zum Zitat Paterson, M. B., & Stinson, D. R. (2012). A unified approach to combinatorial key pre-distribution schemes for sensor networks. Designs, Codes and Cryptography, 71(3), 1–26. Paterson, M. B., & Stinson, D. R. (2012). A unified approach to combinatorial key pre-distribution schemes for sensor networks. Designs, Codes and Cryptography, 71(3), 1–26.
13.
Zurück zum Zitat Lee, J., & Stinson, D. R. (2008). On the construction of practical key pre-distribution schemes for distributed sensor networks using combinatorial designs. ACM Transactions on Information and System Security - TISSEC, 11(2), 1–35.CrossRef Lee, J., & Stinson, D. R. (2008). On the construction of practical key pre-distribution schemes for distributed sensor networks using combinatorial designs. ACM Transactions on Information and System Security - TISSEC, 11(2), 1–35.CrossRef
14.
Zurück zum Zitat Subash, T. D., Divya, C. (2011). Novel key pre-distribution scheme in wireless sensor network. In 2011 international conference on emerging trends in electrical and computer technology (ICETECT) (pp. 959–963). Subash, T. D., Divya, C. (2011). Novel key pre-distribution scheme in wireless sensor network. In 2011 international conference on emerging trends in electrical and computer technology (ICETECT) (pp. 959–963).
15.
Zurück zum Zitat Perrig, A., & Szewczyk, R. (2002). SPINS: Security protocols for sensor networks. Wireless Networks, 8(5), 521–534.CrossRefMATH Perrig, A., & Szewczyk, R. (2002). SPINS: Security protocols for sensor networks. Wireless Networks, 8(5), 521–534.CrossRefMATH
16.
Zurück zum Zitat Huang, H. P., Wang, R. C., Sun, L. J., & Xiao, F. (2009). Key distribution scheme of wireless sensor networks based on logic grid. Journal on Communications, 30(8), 131–140. Huang, H. P., Wang, R. C., Sun, L. J., & Xiao, F. (2009). Key distribution scheme of wireless sensor networks based on logic grid. Journal on Communications, 30(8), 131–140.
17.
Zurück zum Zitat Hou, H., & Liu, S. (2009). CPK-based authentication and key agreement protocols with anonymity for wireless network. In 2009 International conference on multimedia information networking and security (Vol. 2009, pp. 347–350). Hou, H., & Liu, S. (2009). CPK-based authentication and key agreement protocols with anonymity for wireless network. In 2009 International conference on multimedia information networking and security (Vol. 2009, pp. 347–350).
18.
Zurück zum Zitat Shi, H, He, M, & Qin, Z. (2006). Authenticated and communication efficient group key agreement for clustered ad hoc networks. In 5th International conference on cryptology and network security—CANS 2006. Lecture notes in computer science (Vol. 4301, pp. 73–89). Shi, H, He, M, & Qin, Z. (2006). Authenticated and communication efficient group key agreement for clustered ad hoc networks. In 5th International conference on cryptology and network security—CANS 2006. Lecture notes in computer science (Vol. 4301, pp. 73–89).
19.
Zurück zum Zitat Abdel-Hafez, A., Miri, A., & Oronzo-Barbosa, L. (2007). Authenticated group key agreement protocols for ad hoc wireless networks. International Journal of Network Security, 4(1), 90–98. Abdel-Hafez, A., Miri, A., & Oronzo-Barbosa, L. (2007). Authenticated group key agreement protocols for ad hoc wireless networks. International Journal of Network Security, 4(1), 90–98.
20.
Zurück zum Zitat Konstantinou, E. (2008). Cluster-based group key agreement for wireless ad hoc networks. In 3rd International conference on availability, reliability and security—ARES 2008 (pp. 550–557). Konstantinou, E. (2008). Cluster-based group key agreement for wireless ad hoc networks. In 3rd International conference on availability, reliability and security—ARES 2008 (pp. 550–557).
21.
Zurück zum Zitat Feng-Yu, L., Guo-Hua, C., & Xiao-Ding, L. (2007). Ad hoc networks security mechanism based on CPK. In International conference on computational intelligence and security workshops (Vol. 2007, pp. 522–525). Feng-Yu, L., Guo-Hua, C., & Xiao-Ding, L. (2007). Ad hoc networks security mechanism based on CPK. In International conference on computational intelligence and security workshops (Vol. 2007, pp. 522–525).
22.
Zurück zum Zitat Chatterjee, S., Das, A. K., & Sing, J. K. (2014). An enhanced access control scheme in wireless sensor networks. AD HOC & Sensor Wireless Networks, 21(1), 121–149. Chatterjee, S., Das, A. K., & Sing, J. K. (2014). An enhanced access control scheme in wireless sensor networks. AD HOC & Sensor Wireless Networks, 21(1), 121–149.
23.
Zurück zum Zitat Halford, T. R., Courtade, T. A., Chugg, K. M., & Li, X. (2015). Energy-efficient group key agreement for wireless networks. IEEE Transactions on Wireless Communications, 14(10), 5552–5564.CrossRef Halford, T. R., Courtade, T. A., Chugg, K. M., & Li, X. (2015). Energy-efficient group key agreement for wireless networks. IEEE Transactions on Wireless Communications, 14(10), 5552–5564.CrossRef
24.
Zurück zum Zitat Shen, J., Tan, H., Moh, S., Chung, I., Liu, Q., & Sun, X. (2015). Enhanced secure sensor association and key management in wireless body area networks. Journal Of Communications And Networks, 17(5), 453–462.CrossRef Shen, J., Tan, H., Moh, S., Chung, I., Liu, Q., & Sun, X. (2015). Enhanced secure sensor association and key management in wireless body area networks. Journal Of Communications And Networks, 17(5), 453–462.CrossRef
25.
Zurück zum Zitat Porambage, P., Braeken, A., Schmitt, C., Gurtov, A., Ylianttlia, M., & Stiller, B. (2015). Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for iot applications. IEEE Access, 3(1), 1503–1511.CrossRef Porambage, P., Braeken, A., Schmitt, C., Gurtov, A., Ylianttlia, M., & Stiller, B. (2015). Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for iot applications. IEEE Access, 3(1), 1503–1511.CrossRef
26.
Zurück zum Zitat Ghafoor, A., Sher, M., Imran, M., & Saleem, K. (2015). A lightweight key freshness scheme for wireless sensor networks. In 12th International conference on information technology—new generations (ITNG) (pp. 169–173). Ghafoor, A., Sher, M., Imran, M., & Saleem, K. (2015). A lightweight key freshness scheme for wireless sensor networks. In 12th International conference on information technology—new generations (ITNG) (pp. 169–173).
27.
Zurück zum Zitat Makri, E., & Konstantinou, E. (2011). Constant round group key agreement protocols: A comparative study. Computers and Security, 30(8), 643–678.CrossRef Makri, E., & Konstantinou, E. (2011). Constant round group key agreement protocols: A comparative study. Computers and Security, 30(8), 643–678.CrossRef
Metadaten
Titel
An Authentication Key Establish Protocol for WSNs Based on Combined Key
verfasst von
Qikun Zhang
Junling Yuan
Ge Guo
Yong Gan
Jianwei Zhang
Publikationsdatum
04.11.2017
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 1/2018
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-5040-3

Weitere Artikel der Ausgabe 1/2018

Wireless Personal Communications 1/2018 Zur Ausgabe

Neuer Inhalt