Key Management with Group-Wise Pre-Deployed Keying and Secret Sharing Pre-Deployed Keying
نویسندگان
چکیده
In wireless sensor networks, the key deployment problem has received little attention, whereas it is in fact fundamental, heavily involving crucial (scarce) resources of ad-hoc networks, such as memory and energy availability. In this paper, we first briefly survey the state-of-the art of key deployment strategies that are amenable to ad-hoc network. Then we proposed two possible methods and we shortly investigate their space and computational complexity.
منابع مشابه
Secure Group Key Management for Dynamic Sensor Networks
Problem statement: Key management is an important cryptographic technique for providing security in a dynamic environment of sensor networks. To provide a secure communication among a group of sensor nodes keys should established in an efficient manner. We introduced an efficient and dynamic key management system for dynamic sensor networks. Approach: We pre deployed some of the keying material...
متن کاملMatrix based Key Pre – Distribution Scheme for Wireless Sensor Networks
Wireless sensor networks are used in various applications now-a-days. As they are deployed in open area, there is a need for key management in order to protect the information stored in sensor nodes. To address this problem, we use key pre-distribution scheme. In this paper, we propose a new scheme based on symmetric matrix and maximum rank distance (MRD) codes where the size of the symmetric m...
متن کاملGroup Re - keying Protocol Based on Modular Polynomial Arithmetic Over Galois Field
Problem statement: In this study we propose a group re-keying protocol based on modular polynomial arithmetic over Galois Field GF(2). Common secure group communications requires encryption/decryption for group re-keying process, especially when a group member is leaving the group. Approach: This study proposes secret keys multiplication protocol based on modular polynomial arithmetic (SKMP), w...
متن کاملMUQAMI: A Locally Distributed Key Management Scheme for Clustered Sensor Networks
In many of the sensor network applications like natural habitat monitoring and international border monitoring, sensor networks are deployed in areas, where there is a high possibility of node capture and network level attacks. Specifically in such applications, the sensor nodes are severely limited in resources. We propose MUQAMI, a locally distributed key management scheme for resilience agai...
متن کاملISAP - Authenticated Encryption Inherently Secure Against Passive Side-Channel Attacks
Side-channel attacks and in particular differential power analysis (DPA) attacks pose a serious threat to cryptographic implementations. One approach to counteract such attacks are cryptographic schemes based on fresh re-keying. In settings of pre-shared secret keys, such schemes render DPA infeasible by deriving session keys and by ensuring that the attacker cannot collect side-channel leakage...
متن کامل