Skip to main content

A Novel Key Scheme Based on QR Decomposition for Wireless Sensor Networks

  • Conference paper
Book cover Intelligence and Security Informatics (PAISI 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8039))

Included in the following conference series:

  • 737 Accesses

Abstract

A new wireless sensor network key pre-distribution scheme is presented in this paper. First, non-singular symmetrical matrix is performed with QR decomposition. Second, before deployment, a polynomial, a column and a row of the matrix are preloaded for each node. Third, message-digests are generated from random number and matrix information. Finally, the network key is obtained from the polynomial. The effectiveness of the proposed algorithm is demonstrated by mathematical analysis. The results show that this scheme provides additional communication link verification, and also improves the storage efficiency, network connectivity, resilience.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Modares, H., Salleh, R., Moravejosharieh, A.: Overview of Security Issues in Wireless Sensor Networks. In: Third International Conference on Computational Intelligence, Modelling and Simulation (CIMSiM), Langkawi Malaysia, pp. 308–311 (2011)

    Google Scholar 

  2. Mi, X., Gao, F., Zhang, B.: Security in wireless sensor networks. Joumal of PLA University of Science and Technology (Natural Science Edition) 12(1), 42–47 (2011)

    Google Scholar 

  3. Zhang, J., Varadharajan, V.: Wireless sensor network key management survey and taxonomy. Journal of Network and Computer Applications 33(2), 63–75 (2010)

    Article  Google Scholar 

  4. Eschenauer, L., Gligor, V.D.: A key-management scheme for sensor networks. In: The 9th ACM Conference on Computer and Communication Security, Washington, pp. 41–47 (2002)

    Google Scholar 

  5. Chan, H., Perrig, A., Song, D.: Wireless Sensor Networks, pp. 277–303. Springer US, New York (2004)

    Book  Google Scholar 

  6. Huang, J., Ou, G.H.: A Public Key Polynomial-based Key Pre-distribution Scheme for Large-Scale Wireless Sensor Networks. Ad Hoc & Sensor Wireless Networks 16(1-3), 45–64 (2012)

    Google Scholar 

  7. Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)

    Chapter  Google Scholar 

  8. Zhang, R., Liu, J.-Q., Zhao, J.: An ID-based Key Pre-distribution Scheme for Wireless Sensor Networks. Journal of Electronics & Information Technology 31(4), 929–932 (2009)

    Google Scholar 

  9. Qin, R., Sun, Q.: A Key Management Scheme for Manually Deployed Wireless Sensor Networks Based on Dual Directional Hash Chains. In: Intelligent System Design and Engineering Application (ISDEA), Sanya, pp. 752–755 (2012)

    Google Scholar 

  10. Kifayat: Handbook of Information and Communication Security, pp. 513–552. Springer, Heidelberg (2010)

    Book  Google Scholar 

  11. Zhu, B., Zheng, Y.-F.: How to break LU matrix based key predistribution schemes for Wireless Sensor Networks. In: Preceedings of IEEE the 6th International Conference on Mobile Adhoc and Sensor Systems, Macau, pp. 237–245 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Xie, W., Wang, L., Wang, M. (2013). A Novel Key Scheme Based on QR Decomposition for Wireless Sensor Networks. In: Wang, G.A., Zheng, X., Chau, M., Chen, H. (eds) Intelligence and Security Informatics. PAISI 2013. Lecture Notes in Computer Science, vol 8039. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39693-9_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-39693-9_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-39692-2

  • Online ISBN: 978-3-642-39693-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics