Key Predistribution Technique based on Matrix Decomposition in Wireless Sensor Network

A. Tripathy, Sateesh Kumar Pradhan, Ajit Kumar Nayak, Alok Ranjan Tripathy
{"title":"Key Predistribution Technique based on Matrix Decomposition in Wireless Sensor Network","authors":"A. Tripathy, Sateesh Kumar Pradhan, Ajit Kumar Nayak, Alok Ranjan Tripathy","doi":"10.1109/odicon50556.2021.9429019","DOIUrl":null,"url":null,"abstract":"In many applications wireless sensor networks are used and are installed in hostile environment for sensing different data. To secure data, cryptographic techniques are used. The sensor nodes in the network are distributed randomly in the network and these communicate with the node present within the range of the node. In order to have secure communication by maintaining confidentiality and authentication, key predistribution technique is used. Key predistribution also reduces the memory overhead of storing the key information in the sensor node. In this method key is predistributed in the network before communication. The paper proposes key predistribution method based on matrix decomposition technique known as Cholesky decomposition technique. In this method the key matrix decomposes into lower and upper triangular matrix. The upper triangular matrix is the transpose of lower triangular matrix. Each node stores the row and column information. The nodes involve in communication exchange the row information of the decomposed matrix to generate the secret key which is used for secure message communication. This method provides better key connectivity and also needs less memory to store the polynomial store in the node to generate the key.","PeriodicalId":197132,"journal":{"name":"2021 1st Odisha International Conference on Electrical Power Engineering, Communication and Computing Technology(ODICON)","volume":"494 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 1st Odisha International Conference on Electrical Power Engineering, Communication and Computing Technology(ODICON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/odicon50556.2021.9429019","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

In many applications wireless sensor networks are used and are installed in hostile environment for sensing different data. To secure data, cryptographic techniques are used. The sensor nodes in the network are distributed randomly in the network and these communicate with the node present within the range of the node. In order to have secure communication by maintaining confidentiality and authentication, key predistribution technique is used. Key predistribution also reduces the memory overhead of storing the key information in the sensor node. In this method key is predistributed in the network before communication. The paper proposes key predistribution method based on matrix decomposition technique known as Cholesky decomposition technique. In this method the key matrix decomposes into lower and upper triangular matrix. The upper triangular matrix is the transpose of lower triangular matrix. Each node stores the row and column information. The nodes involve in communication exchange the row information of the decomposed matrix to generate the secret key which is used for secure message communication. This method provides better key connectivity and also needs less memory to store the polynomial store in the node to generate the key.
基于矩阵分解的无线传感器网络密钥预分配技术
在许多应用中,无线传感器网络被使用并安装在恶劣环境中以感知不同的数据。为了保护数据,使用了加密技术。网络中的传感器节点随机分布在网络中,它们与节点范围内存在的节点进行通信。为了保证通信的保密性和安全性,采用了密钥预分发技术。密钥预分配还减少了在传感器节点中存储密钥信息的内存开销。在这种方法中,密钥在通信之前在网络中预先分配。本文提出了一种基于矩阵分解技术的密钥预分配方法,即Cholesky分解技术。该方法将关键矩阵分解为上下三角矩阵。上三角矩阵是下三角矩阵的转置。每个节点存储行和列信息。参与通信的节点通过交换分解矩阵的行信息,生成用于消息安全通信的密钥。这种方法提供了更好的键连通性,并且需要更少的内存来存储生成键的节点中的多项式存储。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信