Skip to main content

Enhancing Resilience of KPS Using Bidirectional Hash Chains and Application on Sensornet

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10394))

Abstract

Key predistribution schemes (KPS) that establish symmetric secrets are best suited for resource constraint devices of low cost Internet of Things (IoT). Due to the large size of network and the limited memory, a given key is shared by a number of nodes (r). This sharing of key leads to deterioration of network resilience metric. Various works try to improve this scenario by use of hash function or otherwise. Two such prominent works are \(q-composite\) scheme by Chan et al. and hash chains scheme by Bechkit et al. Our work first introduces the concept of bidirectional hash functions, that can be viewed as an improvement of hash chain idea of Bechkit et al. Then we combine our bidirectional hash chains with a generic version of \(q-composite\) scheme and apply to a recent efficient scheme Sensornet of Dalai and Sarkar. Analysis with comparative study presents the result that how our scheme performs better than the hash chains, Sensornet and other base schemes.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Bechkit, W., Challal, Y., Bouabdallah, A.: A new class of hash-chain based key pre-distribution schemes for WSN. Comput. Commun. 36(3), 243–255 (2013)

    Article  Google Scholar 

  2. Çamtepe, S.A., Yener, B.: Key distribution mechanisms for wireless sensor networks: a survey. Tech. rep, Rensselaer Polytechnic Institute (2005)

    Google Scholar 

  3. Çamtepe, S.A., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Trans. Netw. 15(2), 346–358 (2007)

    Article  Google Scholar 

  4. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, pp. 197–213. IEEE Computer Society (2003)

    Google Scholar 

  5. Dalai, D.K., Sarkar, P.: Sensornet - a key predistribution scheme for distributed sensors using nets. In: Proceedings of the 6th International Conference on Sensor Networks - SENSORNETS, pp. 49–58. INSTICC, ScitePress (2017)

    Google Scholar 

  6. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, pp. 41–47. ACM (2002)

    Google Scholar 

  7. Kendall, M., Martin, K.M.: Graph-theoretic design and analysis of key predistribution schemes. Des. Codes Crypt. 81(1), 11–34 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  8. Lee, J., Stinson, D.R.: A combinatorial approach to key predistribution for distributed sensor networks. In: IEEE Wireless Communications and Networking Conference, WCNC 2005, pp. 1200–1205 (2005)

    Google Scholar 

  9. Paterson, M.B., Stinson, D.R.: A unified approach to combinatorial key predistribution schemes for sensor networks. Des. Codes Crypt. 71(3), 433–457 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  10. Ruj, S., Roy, B.: Key predistribution schemes using codes in wireless sensor networks. In: Yung, M., Liu, P., Lin, D. (eds.) Inscrypt 2008. LNCS, vol. 5487, pp. 275–288. Springer, Heidelberg (2009). doi:10.1007/978-3-642-01440-6_22

    Chapter  Google Scholar 

  11. Simonova, K., Ling, A.C.H., Wang, X.S.: Location-aware key predistribution scheme for wide area wireless sensor networks. In: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 157–168 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Deepak Kumar Dalai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Dalai, D.K., Sarkar, P. (2017). Enhancing Resilience of KPS Using Bidirectional Hash Chains and Application on Sensornet. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds) Network and System Security. NSS 2017. Lecture Notes in Computer Science(), vol 10394. Springer, Cham. https://doi.org/10.1007/978-3-319-64701-2_54

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-64701-2_54

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-64700-5

  • Online ISBN: 978-3-319-64701-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics