Font Size: a A A

A Sub-region Key Management Scheme For Distributed Wireless Sensor Network

Posted on:2018-08-04Degree:MasterType:Thesis
Country:ChinaCandidate:L FengFull Text:PDF
GTID:2348330512988850Subject:Signal and Information Processing
Abstract/Summary:PDF Full Text Request
In this paper,a sub-region key management scheme based on bivariate symmetric polynomials is proposed for distributed wireless sensor network.A certain amount of bivariate symmetric polynomials are stored in sensor nodes by sub-region,we choose the hash function value which is generated by all the common bivariate symmetric polynomials of the two communication nodes as the session keys.It ensures any two adjacent nodes can communicate securely.In this paper,we introduce a compromise key management scheme to achieve the best performance of the network.Moreover,The security analysis and simulation results shows our scheme balances the contradictory relationship among energy overhead,encryption techniques and networks resilience.(1)The relationship between network energy and encryption technology.For the bivariate symmetric polynomial,the calculated energy consumption is positively correlated with the length(ie,the degree)of the polynomial,and the storage energy overhead is proportional to the number of polynomials.In this paper,we can see that binary polynomials are suitable for wireless sensor network encryption(2)The contradiction between network energy consumption and survivability.In this paper,we choose the hash function of all the same binary polynomials in any two adjacent nodes as the session key.So when some nodes are compromised,the possibility of exposure to other non-compromised node keys will be reduced due to the diversity of the keys.(3)The scheme of this paper is applied to the homogeneous network first,our scheme is proved to be rationality and superiority through theoretical analysis and simulation experiments on the survivability of network connectivity,average energy consumption.Then,the proposed scheme is extended to the mobile heterogeneous network,and the simulation results show that our scheme is also suitable for mobile heterogeneous wireless sensor networks.
Keywords/Search Tags:wireless sensor network, key management, bivariate polynomial, security, sub-region
PDF Full Text Request
Related items