{"title":"基于子密钥池的无线传感器网络成对密钥管理方案","authors":"Jianmin Zhang, Yu Ding","doi":"10.1109/ITCS.2010.13","DOIUrl":null,"url":null,"abstract":"Key management in sensor networks has become a challenging issue in the design and the development of secure wireless sensor networks since asymmetric cryptosystems are unsuitable for use in resource constrained sensor nodes, and also because the nodes are vulnerable to physical capture. In this paper, we present a new key management scheme using sub key pool to enlarge the size of key pool. With the more keys in the key pool, this scheme has higher security against node capture. The analysis shows that this scheme provides better security compared to the previous approaches, and can ensure reasonable connectivity at the same time.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Pairwise Key Management Scheme Using Sub Key Pool for Wireless Sensor Networks\",\"authors\":\"Jianmin Zhang, Yu Ding\",\"doi\":\"10.1109/ITCS.2010.13\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Key management in sensor networks has become a challenging issue in the design and the development of secure wireless sensor networks since asymmetric cryptosystems are unsuitable for use in resource constrained sensor nodes, and also because the nodes are vulnerable to physical capture. In this paper, we present a new key management scheme using sub key pool to enlarge the size of key pool. With the more keys in the key pool, this scheme has higher security against node capture. The analysis shows that this scheme provides better security compared to the previous approaches, and can ensure reasonable connectivity at the same time.\",\"PeriodicalId\":340471,\"journal\":{\"name\":\"2010 Second International Conference on Information Technology and Computer Science\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-07-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 Second International Conference on Information Technology and Computer Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITCS.2010.13\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Second International Conference on Information Technology and Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITCS.2010.13","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Pairwise Key Management Scheme Using Sub Key Pool for Wireless Sensor Networks
Key management in sensor networks has become a challenging issue in the design and the development of secure wireless sensor networks since asymmetric cryptosystems are unsuitable for use in resource constrained sensor nodes, and also because the nodes are vulnerable to physical capture. In this paper, we present a new key management scheme using sub key pool to enlarge the size of key pool. With the more keys in the key pool, this scheme has higher security against node capture. The analysis shows that this scheme provides better security compared to the previous approaches, and can ensure reasonable connectivity at the same time.