Abstract
A new authentication and key establishment method for wireless sensor networks (WSNs) is proposed based on the modification of the key distribution protocol by Blundo et al.
REFERENCES
Blundo, C., De Santis, A., Herzberg, A., Kutten, Sh., Vaccaro, U., and Yung, M., Perfectly secure key distribution for dynamic conferences, Inf. Comput., 1998, vol.146, no. 1, pp. 1–23. https://doi.org/10.1006/inco.1998.2717
Mik, Ch.I., What is wireless sensor network (WSN): Structure, classification, and topologies, 2019. http://digitrode.ru/articles/2015-chto-takoe-besprovodnaya-sensornaya-set-wsn-struktura-klassifikaciya-topologii.html.
Blom, R., An optimal class of symmetric key generation systems, Advances in Cryptology. EUROCRYPT 1984, Beth T., Cot N., and Ingemarsson, I., Eds., Lecture Notes in Computer Science, vol. 209, Berlin: Springer, 1985, pp. 335–338. https://doi.org/10.1007/3-540-39757-4_22
Ovasapyan, T. and Moskvin, D., Security provision in WSN on the basis of the adaptive behavior of nodes, Fourth World Conf. on Smart Trends in Systems, Security and Sustainability, London, 2020, IEEE, 2020, pp. 81–85. https://doi.org/10.1109/WorldS450073.2020.9210421
Demidov, R.A., Zegzhda, P.D., and Kalinin, M.O., Threat analysis of cyber security in wireless adhoc networks using hybrid neural network model, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 971–976. https://doi.org/10.3103/S0146411618080084
Krundyshev, V.M., Identifying cyberthreats in modern industrial systems by means of deep-learning networks, Autom. Control Comput. Sci., 2019, vol. 3, no. 8, pp. 1006–1011. https://doi.org/10.3103/S014641161908011X
Belenko, V., Krundyshev, V., and Kalinin, M., Intrusion detection for Internet of Things applying metagenome fast analysis, Third World Conf. on Smart Trends in Systems Security and Sustainability (WorldS4), London, 2019, IEEE, 2019, pp. 129–135. https://doi.org/10.1109/WorldS4.2019.8904022
Funding
The research is funded by the Ministry of Science and Higher Education of the Russian Federation as part of the World-Class Research Center program: Advanced Digital Technologies (contract no. 075-15-2022-311 dated April 20, 2022).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
The author declares that he has no conflicts of interest.
Additional information
Translated by O. Pismenov
About this article
Cite this article
Shenets, N.N. Authentication and Key Establishment in WSN Based on Key Predistribution. Aut. Control Comp. Sci. 56, 947–956 (2022). https://doi.org/10.3103/S0146411622080247
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411622080247