Abstract
A new wireless sensor network key pre-distribution scheme is presented in this paper. First, non-singular symmetrical matrix is performed with QR decomposition. Second, before deployment, a polynomial, a column and a row of the matrix are preloaded for each node. Third, message-digests are generated from random number and matrix information. Finally, the network key is obtained from the polynomial. The effectiveness of the proposed algorithm is demonstrated by mathematical analysis. The results show that this scheme provides additional communication link verification, and also improves the storage efficiency, network connectivity, resilience.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Modares, H., Salleh, R., Moravejosharieh, A.: Overview of Security Issues in Wireless Sensor Networks. In: Third International Conference on Computational Intelligence, Modelling and Simulation (CIMSiM), Langkawi Malaysia, pp. 308–311 (2011)
Mi, X., Gao, F., Zhang, B.: Security in wireless sensor networks. Joumal of PLA University of Science and Technology (Natural Science Edition) 12(1), 42–47 (2011)
Zhang, J., Varadharajan, V.: Wireless sensor network key management survey and taxonomy. Journal of Network and Computer Applications 33(2), 63–75 (2010)
Eschenauer, L., Gligor, V.D.: A key-management scheme for sensor networks. In: The 9th ACM Conference on Computer and Communication Security, Washington, pp. 41–47 (2002)
Chan, H., Perrig, A., Song, D.: Wireless Sensor Networks, pp. 277–303. Springer US, New York (2004)
Huang, J., Ou, G.H.: A Public Key Polynomial-based Key Pre-distribution Scheme for Large-Scale Wireless Sensor Networks. Ad Hoc & Sensor Wireless Networks 16(1-3), 45–64 (2012)
Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)
Zhang, R., Liu, J.-Q., Zhao, J.: An ID-based Key Pre-distribution Scheme for Wireless Sensor Networks. Journal of Electronics & Information Technology 31(4), 929–932 (2009)
Qin, R., Sun, Q.: A Key Management Scheme for Manually Deployed Wireless Sensor Networks Based on Dual Directional Hash Chains. In: Intelligent System Design and Engineering Application (ISDEA), Sanya, pp. 752–755 (2012)
Kifayat: Handbook of Information and Communication Security, pp. 513–552. Springer, Heidelberg (2010)
Zhu, B., Zheng, Y.-F.: How to break LU matrix based key predistribution schemes for Wireless Sensor Networks. In: Preceedings of IEEE the 6th International Conference on Mobile Adhoc and Sensor Systems, Macau, pp. 237–245 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Xie, W., Wang, L., Wang, M. (2013). A Novel Key Scheme Based on QR Decomposition for Wireless Sensor Networks. In: Wang, G.A., Zheng, X., Chau, M., Chen, H. (eds) Intelligence and Security Informatics. PAISI 2013. Lecture Notes in Computer Science, vol 8039. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39693-9_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-39693-9_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39692-2
Online ISBN: 978-3-642-39693-9
eBook Packages: Computer ScienceComputer Science (R0)