{"title":"基于id的无线传感器网络密钥预分配方案","authors":"Peidong Wang, Yishu Cong","doi":"10.1109/YCICT.2010.5713116","DOIUrl":null,"url":null,"abstract":"A new security and efficient key pre-distribution scheme for wireless sensor network was put forward based on node ID and one-way hash functions, which could achieves a higher level security with considerably low communication overhead compared with existing typical pre-distribution scheme. This scheme could distribute and update the share key by one-time local broadcasting based on the one-way and non-comparison character of hash function, and resolve the problems of lower resiliency to node capture and higher communications burden in the key distribution and updating. The theoretical analysis and simulation experiments show that the whole network can afford the best security against the node capture attacking and performs outstanding ability in connectivity of network and also requires less storage consumption.","PeriodicalId":179847,"journal":{"name":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"ID-based key pre-distribution scheme for wireless sensor networks\",\"authors\":\"Peidong Wang, Yishu Cong\",\"doi\":\"10.1109/YCICT.2010.5713116\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A new security and efficient key pre-distribution scheme for wireless sensor network was put forward based on node ID and one-way hash functions, which could achieves a higher level security with considerably low communication overhead compared with existing typical pre-distribution scheme. This scheme could distribute and update the share key by one-time local broadcasting based on the one-way and non-comparison character of hash function, and resolve the problems of lower resiliency to node capture and higher communications burden in the key distribution and updating. The theoretical analysis and simulation experiments show that the whole network can afford the best security against the node capture attacking and performs outstanding ability in connectivity of network and also requires less storage consumption.\",\"PeriodicalId\":179847,\"journal\":{\"name\":\"2010 IEEE Youth Conference on Information, Computing and Telecommunications\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 IEEE Youth Conference on Information, Computing and Telecommunications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/YCICT.2010.5713116\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE Youth Conference on Information, Computing and Telecommunications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/YCICT.2010.5713116","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
ID-based key pre-distribution scheme for wireless sensor networks
A new security and efficient key pre-distribution scheme for wireless sensor network was put forward based on node ID and one-way hash functions, which could achieves a higher level security with considerably low communication overhead compared with existing typical pre-distribution scheme. This scheme could distribute and update the share key by one-time local broadcasting based on the one-way and non-comparison character of hash function, and resolve the problems of lower resiliency to node capture and higher communications burden in the key distribution and updating. The theoretical analysis and simulation experiments show that the whole network can afford the best security against the node capture attacking and performs outstanding ability in connectivity of network and also requires less storage consumption.