Abstract
Key predistribution schemes (KPS) that establish symmetric secrets are best suited for resource constraint devices of low cost Internet of Things (IoT). Due to the large size of network and the limited memory, a given key is shared by a number of nodes (r). This sharing of key leads to deterioration of network resilience metric. Various works try to improve this scenario by use of hash function or otherwise. Two such prominent works are \(q-composite\) scheme by Chan et al. and hash chains scheme by Bechkit et al. Our work first introduces the concept of bidirectional hash functions, that can be viewed as an improvement of hash chain idea of Bechkit et al. Then we combine our bidirectional hash chains with a generic version of \(q-composite\) scheme and apply to a recent efficient scheme Sensornet of Dalai and Sarkar. Analysis with comparative study presents the result that how our scheme performs better than the hash chains, Sensornet and other base schemes.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Bechkit, W., Challal, Y., Bouabdallah, A.: A new class of hash-chain based key pre-distribution schemes for WSN. Comput. Commun. 36(3), 243–255 (2013)
Çamtepe, S.A., Yener, B.: Key distribution mechanisms for wireless sensor networks: a survey. Tech. rep, Rensselaer Polytechnic Institute (2005)
Çamtepe, S.A., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Trans. Netw. 15(2), 346–358 (2007)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, pp. 197–213. IEEE Computer Society (2003)
Dalai, D.K., Sarkar, P.: Sensornet - a key predistribution scheme for distributed sensors using nets. In: Proceedings of the 6th International Conference on Sensor Networks - SENSORNETS, pp. 49–58. INSTICC, ScitePress (2017)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, pp. 41–47. ACM (2002)
Kendall, M., Martin, K.M.: Graph-theoretic design and analysis of key predistribution schemes. Des. Codes Crypt. 81(1), 11–34 (2016)
Lee, J., Stinson, D.R.: A combinatorial approach to key predistribution for distributed sensor networks. In: IEEE Wireless Communications and Networking Conference, WCNC 2005, pp. 1200–1205 (2005)
Paterson, M.B., Stinson, D.R.: A unified approach to combinatorial key predistribution schemes for sensor networks. Des. Codes Crypt. 71(3), 433–457 (2014)
Ruj, S., Roy, B.: Key predistribution schemes using codes in wireless sensor networks. In: Yung, M., Liu, P., Lin, D. (eds.) Inscrypt 2008. LNCS, vol. 5487, pp. 275–288. Springer, Heidelberg (2009). doi:10.1007/978-3-642-01440-6_22
Simonova, K., Ling, A.C.H., Wang, X.S.: Location-aware key predistribution scheme for wide area wireless sensor networks. In: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 157–168 (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Dalai, D.K., Sarkar, P. (2017). Enhancing Resilience of KPS Using Bidirectional Hash Chains and Application on Sensornet. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds) Network and System Security. NSS 2017. Lecture Notes in Computer Science(), vol 10394. Springer, Cham. https://doi.org/10.1007/978-3-319-64701-2_54
Download citation
DOI: https://doi.org/10.1007/978-3-319-64701-2_54
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-64700-5
Online ISBN: 978-3-319-64701-2
eBook Packages: Computer ScienceComputer Science (R0)