{"title":"一种高效、可扩展的分层无线传感器网络密钥分发机制","authors":"An-Ni Shen, Song Guo, H. Chien","doi":"10.1109/SARNOF.2009.4850313","DOIUrl":null,"url":null,"abstract":"Many applications of wireless sensor network (WSN) require secure data communications, especially in a hostile environment. In order to protect the sensitive data and the sensor readings, secret keys should be used to encrypt the exchanged messages between communicating nodes. Traditional asymmetric key cryptosystems are infeasible in WSNs due to the low capacity of each senor node. In this paper, we propose a new key pre-distribution scheme for hierarchical WSNs. Compared to some of the existing schemes, our methods possess the following features that are particularly beneficial to the resource-constrained large-scale WSNs: (1) it can fully defend against the node captured attack, (2) it minimizes the storage and communication overhead, and (3) it provides full connectivity of the network.","PeriodicalId":230233,"journal":{"name":"2009 IEEE Sarnoff Symposium","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"An efficient and scalable key distribution mechanism for hierarchical wireless sensor networks\",\"authors\":\"An-Ni Shen, Song Guo, H. Chien\",\"doi\":\"10.1109/SARNOF.2009.4850313\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Many applications of wireless sensor network (WSN) require secure data communications, especially in a hostile environment. In order to protect the sensitive data and the sensor readings, secret keys should be used to encrypt the exchanged messages between communicating nodes. Traditional asymmetric key cryptosystems are infeasible in WSNs due to the low capacity of each senor node. In this paper, we propose a new key pre-distribution scheme for hierarchical WSNs. Compared to some of the existing schemes, our methods possess the following features that are particularly beneficial to the resource-constrained large-scale WSNs: (1) it can fully defend against the node captured attack, (2) it minimizes the storage and communication overhead, and (3) it provides full connectivity of the network.\",\"PeriodicalId\":230233,\"journal\":{\"name\":\"2009 IEEE Sarnoff Symposium\",\"volume\":\"29 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-03-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 IEEE Sarnoff Symposium\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SARNOF.2009.4850313\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 IEEE Sarnoff Symposium","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SARNOF.2009.4850313","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An efficient and scalable key distribution mechanism for hierarchical wireless sensor networks
Many applications of wireless sensor network (WSN) require secure data communications, especially in a hostile environment. In order to protect the sensitive data and the sensor readings, secret keys should be used to encrypt the exchanged messages between communicating nodes. Traditional asymmetric key cryptosystems are infeasible in WSNs due to the low capacity of each senor node. In this paper, we propose a new key pre-distribution scheme for hierarchical WSNs. Compared to some of the existing schemes, our methods possess the following features that are particularly beneficial to the resource-constrained large-scale WSNs: (1) it can fully defend against the node captured attack, (2) it minimizes the storage and communication overhead, and (3) it provides full connectivity of the network.