+ All Categories
Home > Documents > Source: Lecture Notes in Computer Science, Vol. 6018, pp. 291-304, 2010.

Source: Lecture Notes in Computer Science, Vol. 6018, pp. 291-304, 2010.

Date post: 06-Jan-2016
Category:
Upload: jiro
View: 24 times
Download: 1 times
Share this document with a friend
Description:
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks. Source: Lecture Notes in Computer Science, Vol. 6018, pp. 291-304, 2010. Authors: Hao Wang, Jian Yang, Ping Wang, and Pu Tu Presenter: Hsing-Lei Wang Date: 2011/02/18. Outline. - PowerPoint PPT Presentation
19
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science, Vol. 6018, pp. 291-304, 2010. Authors: Hao Wang, Jian Yang, Ping Wang, and Pu Tu Presenter: Hsing-Lei Wang Date: 2011/02/18
Transcript
Page 1: Source: Lecture Notes in Computer Science, Vol. 6018,  pp. 291-304, 2010.

Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks

Source: Lecture Notes in Computer Science, Vol. 6018, pp. 291-304, 2010.Authors: Hao Wang, Jian Yang, Ping Wang, and Pu TuPresenter: Hsing-Lei WangDate: 2011/02/18

Page 2: Source: Lecture Notes in Computer Science, Vol. 6018,  pp. 291-304, 2010.

Outline

•Introduction•Cluster-Based Deployment Model•Efficient Pairwise Key Establishment and

Management•Performance Analysis•Conclusion•Comments

2

Page 3: Source: Lecture Notes in Computer Science, Vol. 6018,  pp. 291-304, 2010.

Introduction

•Main contributions:▫Propose the new cluster-based model of the

network topology▫Present the pairwise key establishment

scheme•Advantages:

▫Better connectivity and security▫Lower communication and computational

overhead▫More scalable and flexible network size

3

Page 4: Source: Lecture Notes in Computer Science, Vol. 6018,  pp. 291-304, 2010.

Cluster-Based Deployment Model•Notation (1)

▫P: key pool▫|P|: size of key pool▫M: sub key pool▫|M|: size of sub key pool▫m: number of keys in each node’s key ring▫n: network size▫t: number of clusters▫Ni: Node identifier

4

Page 5: Source: Lecture Notes in Computer Science, Vol. 6018,  pp. 291-304, 2010.

Cluster-Based Deployment Model•Notation (2)

▫r: number of nodes in a cluster▫p: probability▫Bu: the broadcasting message of node u

▫kuv: pairwise key shared by node u and v

▫Nu: random value generated by node u

▫k_ID_uvw1: common key’s ID of node u, v

▫Ekuc{M}: cipher text of message M

encrypted by key kuc

5

Page 6: Source: Lecture Notes in Computer Science, Vol. 6018,  pp. 291-304, 2010.

Cluster-Based Deployment Model

6

The Network Topology of the Cluster-Based Deployment Model

Key Pool P

Sub-Key Pool M

Cluster Cluster

ClusterCluster

N1 N2N

N

N

C-Head

m

m

mm

m

mm

m

m

Page 7: Source: Lecture Notes in Computer Science, Vol. 6018,  pp. 291-304, 2010.

Efficient Pairwise Key Establishment and Management

•Establishment of the Pairwise Keys Directly

•Establishment of the Pairwise Keys via Intermediate Nodes

7

Page 8: Source: Lecture Notes in Computer Science, Vol. 6018,  pp. 291-304, 2010.

Establishment of the Pairwise keys Directly (1/3)•Node u find the common keys by

broadcasting a message to its neighbor nodes

8

, _ 1, _ 2,..., _u uB u N k ID k ID k IDm

u

uB

uB

uB

uB

Page 9: Source: Lecture Notes in Computer Science, Vol. 6018,  pp. 291-304, 2010.

Establishment of the Pairwise keys Directly (2/3)•Assume a node v received the message, it

will compare all the node u keys’ ID with its own keys’ ID, then reply their common keys’ ID to the node u

9

v u , _ _ 1, _ _ 2,..., _ _uM v N k ID uv k ID uv k ID uvw

Page 10: Source: Lecture Notes in Computer Science, Vol. 6018,  pp. 291-304, 2010.

Establishment of the Pairwise keys Directly (3/3)• The common keys will be stored in a form as

Table 1• They take the first common key as their pairwise

key

10

Page 11: Source: Lecture Notes in Computer Science, Vol. 6018,  pp. 291-304, 2010.

Establishment of the Pairwise Keys

via Intermediate Nodes (1/4)

11

Page 12: Source: Lecture Notes in Computer Science, Vol. 6018,  pp. 291-304, 2010.

•If node v found that there is no common key with node u, it then returns a message to u

12

Establishment of the Pairwise Keys

via Intermediate Nodes (2/4)

, ,u vM v N Nv u

Page 13: Source: Lecture Notes in Computer Science, Vol. 6018,  pp. 291-304, 2010.

•Node u receives the message, stores Nv, and selects node a, c to forward the key’s materials to node v

13

Establishment of the Pairwise Keys

via Intermediate Nodes (3/4)

1, |uak uM u E v N

2, |uck uM u E v N

u

a

c

Page 14: Source: Lecture Notes in Computer Science, Vol. 6018,  pp. 291-304, 2010.

Establishment of the Pairwise Keys

via Intermediate Nodes (4/4)•If node a, c have the pairwise keys with

node v, they transmit the messages to node v.

•The node u and node v can calculate a new pairwise key:

14

1 2uv v u uk N N N v u

Page 15: Source: Lecture Notes in Computer Science, Vol. 6018,  pp. 291-304, 2010.

Performance Analysis•Network Connectivity (1/2)

15

|P|=10,000

Page 16: Source: Lecture Notes in Computer Science, Vol. 6018,  pp. 291-304, 2010.

Performance Analysis•Network Connectivity (2/2)

16

Page 17: Source: Lecture Notes in Computer Science, Vol. 6018,  pp. 291-304, 2010.

Performance Analysis•Security Analysis

17

Page 18: Source: Lecture Notes in Computer Science, Vol. 6018,  pp. 291-304, 2010.

Conclusion

•Compared to the EG Scheme and the Chan et al. Scheme, this scheme has some properties:▫Better network connectivity and resiliency▫Much more scalable and flexible for

network size▫Lower computational and communication

overhead

18

Page 19: Source: Lecture Notes in Computer Science, Vol. 6018,  pp. 291-304, 2010.

Comments

•The cluster head management mechanisms should be described

•The analysis of the computational and communication overhead should show the comparison of the overhead by numbers

•The authors have not compare their scheme to the EG scheme and Chan et al. scheme in network connectivity

19


Recommended