{"title":"Random key pre-distribution with transitory master key for wireless sensor networks","authors":"F. Gandino, B. Montrucchio, M. Rebaudengo","doi":"10.1145/1658997.1659012","DOIUrl":null,"url":null,"abstract":"Many Wireless Sensor Networks (WSNs) employ security schemes based on the symmetric encryption, which requires the establishment and management of cryptographic keys. This paper presents a new key management scheme based on Random Key Pre-Distribution. The novelty of the proposed approach is the introduction of a keyed transformation with a Transitory Master Key, which is exploited by the nodes in order to increase the number of different keys employed in the network. The presence of a larger pool of keys provides more robustness and connectivity than previously proposed Random Key Distribution schemes. Furthermore, random pre-distribution allows recovering secure communication also when the master key has been compromised.","PeriodicalId":181045,"journal":{"name":"Co-Next Student Workshop '09","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Co-Next Student Workshop '09","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1658997.1659012","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Many Wireless Sensor Networks (WSNs) employ security schemes based on the symmetric encryption, which requires the establishment and management of cryptographic keys. This paper presents a new key management scheme based on Random Key Pre-Distribution. The novelty of the proposed approach is the introduction of a keyed transformation with a Transitory Master Key, which is exploited by the nodes in order to increase the number of different keys employed in the network. The presence of a larger pool of keys provides more robustness and connectivity than previously proposed Random Key Distribution schemes. Furthermore, random pre-distribution allows recovering secure communication also when the master key has been compromised.