Shadowing Model For Secret Key Extraction From WSN

نویسندگان

  • Shekhar M. Nalawade
  • Sachin D. Babar
چکیده

We propose a new solution for key generation process on the basis of Received Signal Strength (RSS) for wireless sensor nodes. We use simulation environments to show that RSS at both the communicating parties is same due to high data transmission rates is a random characteristic and can be used to generate a secret key. We also try to show that how it can become vulnerable if proper care is not taken about the architecture of system. Few solutions were which were provided for the key generation like its pre-distribution and other key generation algorithms results in repetition of keys after particular interval. Pre-distribution means that provider has to imprint the legitimate key on product itself but such keys results in unreliable to end users. In our architecture design our key generation basis itself is different so it automatically will be helpful for us to design random secret key. Mathematical calculation capabilities of wireless senor nodes are limited so it’s unavoidable to use some adversary which will do calculations on behalf of them and provide a key. It’s well known to everyone now that random secret key generation and its authentic distribution will be an important characteristic of wireless networks. After we complete the generation of key we should be use very secured mechanism so that key can be distributed among wireless sensor nodes. Finally we show that, how RSS calculations are random as per the position of nodes in the network and how we have achieved so. Keywords—Received Signal Strength, ZigBee Sensor Nodes, Shadowing Model, 802.15.4, Shadowing Model

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimal SVD-based Precoding for Secret Key Extraction from Correlated OFDM Sub-Channels

Secret key extraction is a crucial issue in physical layer security and a less complex and, at the same time, a more robust scheme for the next generation of 5G and beyond. Unlike previous works on this topic, in which Orthogonal Frequency Division Multiplexing (OFDM) sub-channels were considered to be independent, the effect of correlation between sub-channels on the secret key rate is address...

متن کامل

A Dynamic Key Management Scheme Based on Secret Sharing for Hierarchical Wireless Sensor Networks

Since wireless sensor networks (WSN for short) are often deployed in hostile environments in many applications, security becomes one of the critical issues in WSN. Moreover, due to the limitation of the sensor nodes, traditional key management schemes are not suitable for it. Thereby, a feasible and efficient key management scheme is an important guarantee for WSN to communicate securely. For t...

متن کامل

WSN : Key Issues in Key Management Schemes - A Review

The real challenges in the field of Wireless Sensor Networks (WSN) are to control the trade-off between providing security and conserving scarce resources. To provide security besides cryptographic primitives, secret key also play a vital role. The reason for key management is to set up and to provide secure channels among sensor nodes in WSN applications. Various key management schemes are pro...

متن کامل

Distance Measurement Model Based on RSSI in WSN

The relationship between RSSI (Received Signal Strength Indication) values and distance is the foundation and the key of ranging and positioning technologies in wireless sensor networks. Log-normal shadowing model (LNSM), as a more general signal propagation model, can better describe the relationship between the RSSI value and distance, but the parameter of variance in LNSM is depended on expe...

متن کامل

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015