{"title":"A hierarchical key pre-distribution scheme","authors":"M. Ramkumar, N. Memon, R. Simha","doi":"10.1109/EIT.2005.1626994","DOIUrl":null,"url":null,"abstract":"We present an efficient, scalable, and renewable hierarchical random key predistribution (KPD) scheme as an enabler for a low complexity security infrastructure. As the proposed KPD scheme employs only symmetric cryptographic primitives it permits resource constrained nodes to take part in the deployment. Further, two nodes need to exchange only their IDs before they can establish a shared secret. The proposed KPD scheme provides scalable security for different levels of the hierarchy depending on available resources. In addition higher levels of the hierarchy are protected from security breaches in lower levels","PeriodicalId":358002,"journal":{"name":"2005 IEEE International Conference on Electro Information Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"20","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2005 IEEE International Conference on Electro Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EIT.2005.1626994","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 20
Abstract
We present an efficient, scalable, and renewable hierarchical random key predistribution (KPD) scheme as an enabler for a low complexity security infrastructure. As the proposed KPD scheme employs only symmetric cryptographic primitives it permits resource constrained nodes to take part in the deployment. Further, two nodes need to exchange only their IDs before they can establish a shared secret. The proposed KPD scheme provides scalable security for different levels of the hierarchy depending on available resources. In addition higher levels of the hierarchy are protected from security breaches in lower levels