By Topic

Asymmetric Key Pre-distribution Scheme for sensor networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Zhihong Liu ; Key Lab. of Comput. Networks & Inf. Security, Xidian Univ., Xi''an ; Jianfeng Ma ; Qiping Huang ; SangJae Moon

A key pre-distribution scheme is a method by which initially an off-line trusted authority distributes pieces of information among a set of users. Later, each member of a group of users can compute a common key for secure communication. In this paper we present an asymmetric key pre-distribution scheme. Instead of assuming that the network is comprised entirely of identical users in conventional key pre-distribution schemes, the network now consists of a mix of users with different missions, i.e., ordinary users and keying material servers. A group of users, using secret keys preloaded in their memory and public keying material retrieved from one keying material server, can compute a session key. The properties of this method are that, the compromise of keying material servers does not reveal any information about users' secret keys and the session keys of privileged subset of users; if computational assumptions are considered, each user has very low storage requirement. These properties make it attractive for sensor networks. We first formally define the asymmetric key pre-distribution scheme in terms of the entropy and give lower bounds on user's storage requirement and the public keying material size. Then, we present its constructions and applications for sensor networks.

Published in:

Wireless Communications, IEEE Transactions on  (Volume:8 ,  Issue: 3 )