{"title":"一种改进的无线传感器网络分布式密钥撤销方案","authors":"Jun Zhou, Mingxing He","doi":"10.1109/ICCT.2008.4716141","DOIUrl":null,"url":null,"abstract":"A distributed reliable key revocation scheme is proposed in this paper according to randomness of the deployment of sensor nodes. This scheme derives the concept of appealing members who are responsible for userspsila revocation operations as the topology varies by using secret sharing techniques and modified Blompsilas symmetric key establishment mechanism. Besides, a novel seed member alternation mechanism is also proposed in this paper, which can efficiently resist of node capture attacks. It also leaves the resources much more balanced among the sensor nodes and helps to prolong the lifetime of WSNs. By comparison, the performance of this scheme is considerably refined in terms of network security, key connectivity, complexity of storage as well as communication.","PeriodicalId":259577,"journal":{"name":"2008 11th IEEE International Conference on Communication Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An improved distributed key revocation scheme in wireless sensor networks\",\"authors\":\"Jun Zhou, Mingxing He\",\"doi\":\"10.1109/ICCT.2008.4716141\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A distributed reliable key revocation scheme is proposed in this paper according to randomness of the deployment of sensor nodes. This scheme derives the concept of appealing members who are responsible for userspsila revocation operations as the topology varies by using secret sharing techniques and modified Blompsilas symmetric key establishment mechanism. Besides, a novel seed member alternation mechanism is also proposed in this paper, which can efficiently resist of node capture attacks. It also leaves the resources much more balanced among the sensor nodes and helps to prolong the lifetime of WSNs. By comparison, the performance of this scheme is considerably refined in terms of network security, key connectivity, complexity of storage as well as communication.\",\"PeriodicalId\":259577,\"journal\":{\"name\":\"2008 11th IEEE International Conference on Communication Technology\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-12-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 11th IEEE International Conference on Communication Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCT.2008.4716141\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 11th IEEE International Conference on Communication Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCT.2008.4716141","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An improved distributed key revocation scheme in wireless sensor networks
A distributed reliable key revocation scheme is proposed in this paper according to randomness of the deployment of sensor nodes. This scheme derives the concept of appealing members who are responsible for userspsila revocation operations as the topology varies by using secret sharing techniques and modified Blompsilas symmetric key establishment mechanism. Besides, a novel seed member alternation mechanism is also proposed in this paper, which can efficiently resist of node capture attacks. It also leaves the resources much more balanced among the sensor nodes and helps to prolong the lifetime of WSNs. By comparison, the performance of this scheme is considerably refined in terms of network security, key connectivity, complexity of storage as well as communication.