Wu Haibing, C. Dong, L. Ping, Liang Mingxi, Y. Hongwei, Gao Haomin
{"title":"基于PTPP的WSN密钥分发方法","authors":"Wu Haibing, C. Dong, L. Ping, Liang Mingxi, Y. Hongwei, Gao Haomin","doi":"10.1109/ICCCNT.2014.6963125","DOIUrl":null,"url":null,"abstract":"With the wide application of WSN, the security issues are also increasingly taken seriously. When the WSN node communication it needs to verify the identity of the other party, the common approach is key authentication, how to ensure the security of the key distribution process is even more important. Based on the analysis of currently used key distribution algorithm, a new method is proposed based on the polynomial-based, time and identity-related key distribution, which using quaternion symmetric polynomial deployment time and node ID will be binding, and establish a shared key between nodes on the basis of this consultation mechanism. The safety and feasibility of the method are analyzed and verified, the simulation results show that the WSN key distribution method based PTPP can effectively prevent a replication node join to network behavior camouflage improve the security of key distribution.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"321 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"WSN key distribution method based on PTPP\",\"authors\":\"Wu Haibing, C. Dong, L. Ping, Liang Mingxi, Y. Hongwei, Gao Haomin\",\"doi\":\"10.1109/ICCCNT.2014.6963125\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the wide application of WSN, the security issues are also increasingly taken seriously. When the WSN node communication it needs to verify the identity of the other party, the common approach is key authentication, how to ensure the security of the key distribution process is even more important. Based on the analysis of currently used key distribution algorithm, a new method is proposed based on the polynomial-based, time and identity-related key distribution, which using quaternion symmetric polynomial deployment time and node ID will be binding, and establish a shared key between nodes on the basis of this consultation mechanism. The safety and feasibility of the method are analyzed and verified, the simulation results show that the WSN key distribution method based PTPP can effectively prevent a replication node join to network behavior camouflage improve the security of key distribution.\",\"PeriodicalId\":140744,\"journal\":{\"name\":\"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)\",\"volume\":\"321 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-07-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCNT.2014.6963125\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCNT.2014.6963125","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
With the wide application of WSN, the security issues are also increasingly taken seriously. When the WSN node communication it needs to verify the identity of the other party, the common approach is key authentication, how to ensure the security of the key distribution process is even more important. Based on the analysis of currently used key distribution algorithm, a new method is proposed based on the polynomial-based, time and identity-related key distribution, which using quaternion symmetric polynomial deployment time and node ID will be binding, and establish a shared key between nodes on the basis of this consultation mechanism. The safety and feasibility of the method are analyzed and verified, the simulation results show that the WSN key distribution method based PTPP can effectively prevent a replication node join to network behavior camouflage improve the security of key distribution.