无线传感器网络中临时主密钥方案的分层密钥协商技术

Cesare Celozzi, F. Gandino, M. Rebaudengo
{"title":"无线传感器网络中临时主密钥方案的分层密钥协商技术","authors":"Cesare Celozzi, F. Gandino, M. Rebaudengo","doi":"10.1109/BWCCA.2013.33","DOIUrl":null,"url":null,"abstract":"Wireless sensor networks have been applied in various contexts where hardware and network data are exposed to security threats, such as tampering or eavesdropping. The majority of the security approaches adopted in this context are based on symmetric encryption, which requires keys shared among the nodes. Many key management schemes, like the transitory master key scheme LEAP+, have been proposed for the negotiation of keys. In this paper a new key negotiation technique suitable for LEAP+ protocol is described. The roposed protocol significantly reduces the time of exposition of sensitive information through a new organization of handshake operations and of key establishment. A comparison with the original version of LEAP+ was performed to evaluate the improvements achieved by the proposed approach.","PeriodicalId":227978,"journal":{"name":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Hierarchical Key Negotiation Technique for Transitory Master Key Schemes in Wireless Sensor Networks\",\"authors\":\"Cesare Celozzi, F. Gandino, M. Rebaudengo\",\"doi\":\"10.1109/BWCCA.2013.33\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless sensor networks have been applied in various contexts where hardware and network data are exposed to security threats, such as tampering or eavesdropping. The majority of the security approaches adopted in this context are based on symmetric encryption, which requires keys shared among the nodes. Many key management schemes, like the transitory master key scheme LEAP+, have been proposed for the negotiation of keys. In this paper a new key negotiation technique suitable for LEAP+ protocol is described. The roposed protocol significantly reduces the time of exposition of sensitive information through a new organization of handshake operations and of key establishment. A comparison with the original version of LEAP+ was performed to evaluate the improvements achieved by the proposed approach.\",\"PeriodicalId\":227978,\"journal\":{\"name\":\"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-10-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/BWCCA.2013.33\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BWCCA.2013.33","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

无线传感器网络已经应用于硬件和网络数据暴露于安全威胁(如篡改或窃听)的各种环境中。在此上下文中采用的大多数安全方法都基于对称加密,这需要在节点之间共享密钥。许多密钥管理方案,如临时主密钥方案LEAP+,已经被提出用于密钥协商。本文提出了一种新的适用于LEAP+协议的密钥协商技术。该协议通过新的握手操作和密钥建立组织,显著减少了敏感信息的暴露时间。与LEAP+的原始版本进行比较,以评估所提出的方法所取得的改进。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Hierarchical Key Negotiation Technique for Transitory Master Key Schemes in Wireless Sensor Networks
Wireless sensor networks have been applied in various contexts where hardware and network data are exposed to security threats, such as tampering or eavesdropping. The majority of the security approaches adopted in this context are based on symmetric encryption, which requires keys shared among the nodes. Many key management schemes, like the transitory master key scheme LEAP+, have been proposed for the negotiation of keys. In this paper a new key negotiation technique suitable for LEAP+ protocol is described. The roposed protocol significantly reduces the time of exposition of sensitive information through a new organization of handshake operations and of key establishment. A comparison with the original version of LEAP+ was performed to evaluate the improvements achieved by the proposed approach.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信