Computer Science ›› 2016, Vol. 43 ›› Issue (11): 215-220.doi: 10.11896/j.issn.1002-137X.2016.11.042

Previous Articles     Next Articles

Key Management Scheme for Three-dimensional Acoustic Sensor Network Based on Cluster

HUANG Bin, LIU Guang-zhong and XU Ming   

  • Online:2018-12-01 Published:2018-12-01

Abstract: In the three-dimensional acoustic sensor network based on cluster,the decorated area is divided into multiple rooms which are cubes.Among cluster head nodes,the symmetric key is generated to verify nodes by relative coordinates.Between nodes within the cluster,the symmetric key is generated to verify nodes by modified symmetric polynomials.When the nodes communicate in the network,they generate symmetric key which is used to communicate by symmetric matrices.It realizes complete connection in communication.Compared with the previous key management scheme for sensor network,this scheme can realize node revocation and key update,and it has high scalability,reliability and low cost.This scheme can also effectively resist DoS attack especially gather attack between nodes’ communication because of first lightweight node authentication mechanism.Compared with one-way hash method,this scheme can more efficiently resist cluster head compromise because of three-dimensional key.

Key words: Three-dimensional key,One-way hash chain,Symmetric matrix,Verification key,Communication key

[1] Heidemann J,Ye W,Wills J,et al.Research challenges and applications for underwater sensor networking[C]∥Proceedings of the Wireless Communication and Networking Conference.Las Vegas,NV,USA,2006,1:228-235
[2] Wei Zhi-qiang,Yang Guang,Cong Yan-ping.Underwater sensor network security research[J].Chinese Journal of Computer,2012,8(35):1594-1606(in Chinese) 魏志强,杨光,丛艳平.水下传感器网络安全研究[J].计算机学报,2012,8(35):1594-1606
[3] Su Zhong,Lin Chuang,Feng Fu-jun.Wireless sensor network key management scheme and protocol [J].Chinese Journal of Software,2007,5(18):1218-1231(in Chinese) 苏忠,林闯,封富君.无线传感器网络密钥管理的方案和协议 [J].软件学报,2007,5(18):1218-1231
[4] Xiao Y,Rayi V K,Sun B,et al.A survey of key managementschemes in wireless sensor networks [J].Computer Communications,2007,30(11/12):2314-2341
[5] Eschenauer L,Gligor V.A key management scheme for distributed sensor networks [C]∥Proc.of the 9th ACM Conf.on Computer and Communications Security.New York:ACM Press,2002:41-47
[6] Blom R.An optimal class of symmetric key generation systems [C]∥Beth T,Cot N,Ingemarsson I,eds.Proc.of the EUROCRYPT’84.New York:Springer-Verlag,1984:335-338
[7] Blundo C,Santis A D,Herzberg A,et al.Perfectly secure key distribution for dynamic conferences [J].Information and Computation,1998,6(1):1-23
[8] Su Zhong, Lin Chuang, Ren Feng-yuan.A preassigned hairschene in Wireless sensor network about the random key based on the hash chain[J].Chinese Journal of Computer,2009,32(1):30-41(in Chinese) 苏忠,林闯,任丰原.无线传感器网络中基于散列链的随机密钥预分发方案[J].计算机学报,2009,32(1):30-41
[9] Perrig A,Stankovic J,Wagner D.Security in wireless sensornetworks [J].Communications of the ACM,2004,7(6):53-57
[10] Bollobas B,Fflton W,Katok A,et al.Rand Graphs [M].Cambridge:Cambridge University Press,2001:160-200
[11] Chan H,Perri G A,Song D.Random key pre-distribution sch-emes for sensor networks[C]∥IEEE Symposium in Security and Privacy.Berkeley,California:IEEE Computer Society,2003:197-205

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!