• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Feng Tao and Ma Jianfeng. A General Key Seed Management and Assignment Model for Wireless Sensor Networks and Application[J]. Journal of Computer Research and Development, 2008, 45(1): 146-153.
Citation: Feng Tao and Ma Jianfeng. A General Key Seed Management and Assignment Model for Wireless Sensor Networks and Application[J]. Journal of Computer Research and Development, 2008, 45(1): 146-153.

A General Key Seed Management and Assignment Model for Wireless Sensor Networks and Application

More Information
  • Published Date: January 14, 2008
  • To achieve security in distributed wireless sensor networks, one of the most promising approaches is the so-called random pre-distribution of key seeds. Pair-wise secure communication channels between nodes were established or discovered by using key seeds information that were constructed and pre-distribution to each node in distributed wireless sensor networks. A general key seeds management and assignment (KSMA) model is proposed, which is used to study the security of key pre-distribution schemes with five attributes for requirement of confidentiality and authentication. New key pre-distribution schemes based on new types of key seed are constructed within the framework of one-way accumulators, and new shared-key discovery protocols are presented. The discovery protocols are provably secure against the active adversaries in universally composable model. It is also shown how to set the parameters (pool and key-ring size) in such a way that the network is not only connected with high probability via secure links, but also new schemes are against Sybil attacks by using identity witness validated technique and achieving node-to-node identity authentication. New key pre-distribution scheme improves the resilience of the network compared with previous schemes, and an analysis of the scheme is given in terms of network resilience and associated overhead.
  • Related Articles

    [1]Li Yang, Ma Ziqiang, Lin Jingqiang, Meng Lingjia, Li Bingyu, Miao Li, Gao Fei. Survey of Transient Execution Attacks[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440167
    [2]Zhang Weijuan, Bai Lu, Ling Yuqing, Lan Xiao, Jia Xiaoqi. Cache Side-Channel Attacks and Defenses[J]. Journal of Computer Research and Development, 2023, 60(1): 206-222. DOI: 10.7544/issn1000-1239.202110774
    [3]Shen Yijie, Li Liangcheng, Liu Ziwei, Liu Tiantian, Luo Hao, Shen Ting, Lin Feng, Ren Kui. Stealthy Attack Towards Speaker Recognition Based on One-“Audio Pixel” Perturbation[J]. Journal of Computer Research and Development, 2021, 58(11): 2350-2363. DOI: 10.7544/issn1000-1239.2021.20210632
    [4]Yang Zheng, Yin Qilei, Li Haoran, Miao Yuanli, Yuan Dong, Wang Qian, Shen Chao, Li Qi. Study of Wechat Sybil Detection[J]. Journal of Computer Research and Development, 2021, 58(11): 2319-2332. DOI: 10.7544/issn1000-1239.2021.20210461
    [5]Zhang Li, Wu Wenling, Zhang Lei, Zheng Yafei. Key-Recovery Attack on Reduced-Round AES-128 Using the Exchange-Equivalence[J]. Journal of Computer Research and Development, 2021, 58(10): 2213-2221. DOI: 10.7544/issn1000-1239.2021.20210549
    [6]Li Qiang, Li Zhoujun, Zhou Changbin, Yu Jie. Sybil Group Attack Detection in Kad Network[J]. Journal of Computer Research and Development, 2014, 51(7): 1614-1623.
    [7]Zhao Xinjie, Wang Tao, Guo Shize, Liu Huiying. Cache Attacks on Block Ciphers[J]. Journal of Computer Research and Development, 2012, 49(3): 453-468.
    [8]Zhao Xinjie, Wang Tao, Guo Shize, Liu Huiying. Cache Attacks on Block Ciphers[J]. Journal of Computer Research and Development, 2012, 49(3): 453-468.
    [9]Chen Haikun, Shi Shengfei, and Li Jianzhong. A Key Management Scheme Based on Variable Transmission Range in Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2008, 45(1): 165-171.
    [10]Zhang Haixia, Su Purui, and Feng Dengguo. A Network Security Analysis Model Based on the Increase in Attack Ability[J]. Journal of Computer Research and Development, 2007, 44(12): 2012-2019.

Catalog

    Article views (801) PDF downloads (558) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return