{"title":"改进的无线传感器网络blom密钥管理方案","authors":"Ankit Gupta, Priyanka Ahlawat","doi":"10.1109/ICRAIE.2014.6909146","DOIUrl":null,"url":null,"abstract":"Wireless sensor network(WSN) are mobile adhoc networks in which sensors have limited resources and communication capabilities.Creating pair-wise secure links between resources constrained sensor nodes is a major challenge. In this paper we point out three serious weaknesses namely, lack of scalability, high memory requirementsand computational overhead for designing pair-wise key agreement between any pair of sensor nodes in a WSN proposed by Chien et al. [1]. We develop a new scheme based on Blom's key agreement protocol [2] which is free from the weaknesses mentioned above. Compared to [1],our scheme requires less memory ,less computational overheads and more secure accesses to the network. Furthermore we have simulated the our scheme and chien et al. scheme in matlab and draw the graph on various factors.","PeriodicalId":355706,"journal":{"name":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Improved blom key management scheme for wireless sensor network\",\"authors\":\"Ankit Gupta, Priyanka Ahlawat\",\"doi\":\"10.1109/ICRAIE.2014.6909146\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless sensor network(WSN) are mobile adhoc networks in which sensors have limited resources and communication capabilities.Creating pair-wise secure links between resources constrained sensor nodes is a major challenge. In this paper we point out three serious weaknesses namely, lack of scalability, high memory requirementsand computational overhead for designing pair-wise key agreement between any pair of sensor nodes in a WSN proposed by Chien et al. [1]. We develop a new scheme based on Blom's key agreement protocol [2] which is free from the weaknesses mentioned above. Compared to [1],our scheme requires less memory ,less computational overheads and more secure accesses to the network. Furthermore we have simulated the our scheme and chien et al. scheme in matlab and draw the graph on various factors.\",\"PeriodicalId\":355706,\"journal\":{\"name\":\"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)\",\"volume\":\"6 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-05-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICRAIE.2014.6909146\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICRAIE.2014.6909146","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Improved blom key management scheme for wireless sensor network
Wireless sensor network(WSN) are mobile adhoc networks in which sensors have limited resources and communication capabilities.Creating pair-wise secure links between resources constrained sensor nodes is a major challenge. In this paper we point out three serious weaknesses namely, lack of scalability, high memory requirementsand computational overhead for designing pair-wise key agreement between any pair of sensor nodes in a WSN proposed by Chien et al. [1]. We develop a new scheme based on Blom's key agreement protocol [2] which is free from the weaknesses mentioned above. Compared to [1],our scheme requires less memory ,less computational overheads and more secure accesses to the network. Furthermore we have simulated the our scheme and chien et al. scheme in matlab and draw the graph on various factors.