{"title":"A robust key management scheme with strong connectivity for wireless sensor network","authors":"A. Chaurasia, Utkarsh Dubey, R. K. Ghosh","doi":"10.1109/CTS.2012.6261049","DOIUrl":null,"url":null,"abstract":"In a wireless sensor network (WSN), creating pairwise secure links between resource constrained sensor nodes is a major challenge. In this paper we point out three serious weaknesses, namely, lack of scalability, high memory requirements and vulnerability to node capture attacks in an earlier scheme for designing pair-wise key agreement between any pair of sensor nodes in a WSN proposed by Chien et al. [1]. We develop a new scheme based on Blom's key agreement protocol [2] which is free from the weaknesses mentioned above. Compared to [1], our scheme not only achieves better resilience against the node capture attack, but also requires less memory and at the same time provides more secure accesses to the network. Furthermore, the computational efficiency of the new scheme is comparable to that of [1].","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 International Conference on Collaboration Technologies and Systems (CTS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CTS.2012.6261049","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
In a wireless sensor network (WSN), creating pairwise secure links between resource constrained sensor nodes is a major challenge. In this paper we point out three serious weaknesses, namely, lack of scalability, high memory requirements and vulnerability to node capture attacks in an earlier scheme for designing pair-wise key agreement between any pair of sensor nodes in a WSN proposed by Chien et al. [1]. We develop a new scheme based on Blom's key agreement protocol [2] which is free from the weaknesses mentioned above. Compared to [1], our scheme not only achieves better resilience against the node capture attack, but also requires less memory and at the same time provides more secure accesses to the network. Furthermore, the computational efficiency of the new scheme is comparable to that of [1].