Skip to main content
Log in

Authentication and Key Establishment in WSN Based on Key Predistribution

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

A new authentication and key establishment method for wireless sensor networks (WSNs) is proposed based on the modification of the key distribution protocol by Blundo et al.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.
Fig. 5.
Fig. 6.
Fig. 7.

REFERENCES

  1. Blundo, C., De Santis, A., Herzberg, A., Kutten, Sh., Vaccaro, U., and Yung, M., Perfectly secure key distribution for dynamic conferences, Inf. Comput., 1998, vol.146, no. 1, pp. 1–23.  https://doi.org/10.1006/inco.1998.2717

    Article  MathSciNet  MATH  Google Scholar 

  2. Mik, Ch.I., What is wireless sensor network (WSN): Structure, classification, and topologies, 2019. http://digitrode.ru/articles/2015-chto-takoe-besprovodnaya-sensornaya-set-wsn-struktura-klassifikaciya-topologii.html.

  3. Blom, R., An optimal class of symmetric key generation systems, Advances in Cryptology. EUROCRYPT 1984, Beth T., Cot N., and Ingemarsson, I., Eds., Lecture Notes in Computer Science, vol. 209, Berlin: Springer, 1985, pp. 335–338.  https://doi.org/10.1007/3-540-39757-4_22

    Book  Google Scholar 

  4. Ovasapyan, T. and Moskvin, D., Security provision in WSN on the basis of the adaptive behavior of nodes, Fourth World Conf. on Smart Trends in Systems, Security and Sustainability, London, 2020, IEEE, 2020, pp. 81–85.  https://doi.org/10.1109/WorldS450073.2020.9210421

  5. Demidov, R.A., Zegzhda, P.D., and Kalinin, M.O., Threat analysis of cyber security in wireless adhoc networks using hybrid neural network model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 971–976. https://doi.org/10.3103/S0146411618080084

    Article  Google Scholar 

  6. Krundyshev, V.M., Identifying cyberthreats in modern industrial systems by means of deep-learning networks, Autom. Control Comput. Sci., 2019, vol. 3, no. 8, pp. 1006–1011.  https://doi.org/10.3103/S014641161908011X

    Article  Google Scholar 

  7. Belenko, V., Krundyshev, V., and Kalinin, M., Intrusion detection for Internet of Things applying metagenome fast analysis, Third World Conf. on Smart Trends in Systems Security and Sustainability (WorldS4), London, 2019, IEEE, 2019, pp. 129–135.  https://doi.org/10.1109/WorldS4.2019.8904022

Download references

Funding

The research is funded by the Ministry of Science and Higher Education of the Russian Federation as part of the World-Class Research Center program: Advanced Digital Technologies (contract no. 075-15-2022-311 dated April 20, 2022).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. N. Shenets.

Ethics declarations

The author declares that he has no conflicts of interest.

Additional information

Translated by O. Pismenov

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shenets, N.N. Authentication and Key Establishment in WSN Based on Key Predistribution. Aut. Control Comp. Sci. 56, 947–956 (2022). https://doi.org/10.3103/S0146411622080247

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411622080247

Keywords:

Navigation