Font Size: a A A

Key-Insulated Encryption Based Key Management Scheme In Wireless Sensor Network

Posted on:2010-12-06Degree:MasterType:Thesis
Country:ChinaCandidate:Y W ZhouFull Text:PDF
GTID:2178360275970368Subject:Cryptography
Abstract/Summary:PDF Full Text Request
Wireless Sensor Network (WSN) is in the wide application potential in military affairs, environment detecting, home network and other commercial fields. Along with its widely using, the security becomes more and more important. The Key Management Scheme, to provide safe and reliable communication for the WSN, is the basically and most important service in the study of the WSN.The LU scheme based on LU decomposition of symmetric matrix is an effective approach to the Key Management. But there exists the possibility that fails to build the common communication key. To solve this problem and decrease communication traffic payload, we propose an LU scheme with authentication mechanism. Through optimizing the key agreement protocol, we prove that the average communication traffic of our scheme is decreased by 16.7%.Furthermore, this paper presents a new key management scheme based on the Key-Insulated Encryption (KIE), called the KIE-WSN scheme including the pair-wise key and group key management scheme. Our study shows that the KIE-WSN has the semantically security and (N-1, N) safety with optimal threshold. Therefore, in our pair-wise scheme, if a sensor node is compromised, the leaked key information won't bring any threaten to the sensor network. At last, the KIE-WSN pair-wise key scheme has a constant complexity in the memory and communication.The last contribution of this paper is that we integrate the pair-wise key and group key management into the KIE-WSN group scheme, which has a robust continuity for the sensor network. Our group key scheme can update the group key dynamically to admit or remove group members with the forward and backward security.At last KIE-WSN schemes'partly implementation in the Sun Spot Sensor and a detailed performance analysis are given out.
Keywords/Search Tags:Wireless Sensor Network, key management, LU key management, Key-Insulated Encryption
PDF Full Text Request
Related items