基于PTPP的WSN密钥分发方法

Wu Haibing, C. Dong, L. Ping, Liang Mingxi, Y. Hongwei, Gao Haomin
{"title":"基于PTPP的WSN密钥分发方法","authors":"Wu Haibing, C. Dong, L. Ping, Liang Mingxi, Y. Hongwei, Gao Haomin","doi":"10.1109/ICCCNT.2014.6963125","DOIUrl":null,"url":null,"abstract":"With the wide application of WSN, the security issues are also increasingly taken seriously. When the WSN node communication it needs to verify the identity of the other party, the common approach is key authentication, how to ensure the security of the key distribution process is even more important. Based on the analysis of currently used key distribution algorithm, a new method is proposed based on the polynomial-based, time and identity-related key distribution, which using quaternion symmetric polynomial deployment time and node ID will be binding, and establish a shared key between nodes on the basis of this consultation mechanism. The safety and feasibility of the method are analyzed and verified, the simulation results show that the WSN key distribution method based PTPP can effectively prevent a replication node join to network behavior camouflage improve the security of key distribution.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"321 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"WSN key distribution method based on PTPP\",\"authors\":\"Wu Haibing, C. Dong, L. Ping, Liang Mingxi, Y. Hongwei, Gao Haomin\",\"doi\":\"10.1109/ICCCNT.2014.6963125\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the wide application of WSN, the security issues are also increasingly taken seriously. When the WSN node communication it needs to verify the identity of the other party, the common approach is key authentication, how to ensure the security of the key distribution process is even more important. Based on the analysis of currently used key distribution algorithm, a new method is proposed based on the polynomial-based, time and identity-related key distribution, which using quaternion symmetric polynomial deployment time and node ID will be binding, and establish a shared key between nodes on the basis of this consultation mechanism. The safety and feasibility of the method are analyzed and verified, the simulation results show that the WSN key distribution method based PTPP can effectively prevent a replication node join to network behavior camouflage improve the security of key distribution.\",\"PeriodicalId\":140744,\"journal\":{\"name\":\"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)\",\"volume\":\"321 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-07-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCNT.2014.6963125\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCNT.2014.6963125","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

随着无线传感器网络的广泛应用,其安全问题也日益受到重视。当WSN节点通信时需要验证对方的身份,常用的方法是密钥认证,如何保证密钥分发过程的安全性就显得尤为重要。在分析当前常用密钥分发算法的基础上,提出了一种基于多项式的、与时间和身份相关的密钥分发方法,利用四元数对称多项式将部署时间与节点ID绑定,并在此基础上建立节点间共享密钥的协商机制。对该方法的安全性和可行性进行了分析和验证,仿真结果表明,基于PTPP的WSN密钥分发方法可以有效防止复制节点加入网络行为伪装,提高了密钥分发的安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
WSN key distribution method based on PTPP
With the wide application of WSN, the security issues are also increasingly taken seriously. When the WSN node communication it needs to verify the identity of the other party, the common approach is key authentication, how to ensure the security of the key distribution process is even more important. Based on the analysis of currently used key distribution algorithm, a new method is proposed based on the polynomial-based, time and identity-related key distribution, which using quaternion symmetric polynomial deployment time and node ID will be binding, and establish a shared key between nodes on the basis of this consultation mechanism. The safety and feasibility of the method are analyzed and verified, the simulation results show that the WSN key distribution method based PTPP can effectively prevent a replication node join to network behavior camouflage improve the security of key distribution.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信