TY - JOUR
T1 - Ternary polynomial based key management scheme for wireless sensor network
AU - Guan, Zhi Tao
AU - Xu, Yue
AU - Wu, Jun
PY - 2013/12
Y1 - 2013/12
N2 - A ternary polynomial based key management (KMTP) scheme was proposed, which is effective in cluster based wireless sensor networks. Firstly, the base station will give each node one unique identifier to ensure the validity of the node. Then, algorithm of the inner-cluster and inter-cluster key pre-distribution based on the ternary polynomial of the same order was stated, which can ensure the value of the cracking threshold is bigger than the number of nodes of a cluster and all clusters separately, which means it's very hard to be cracked even all nodes of a cluster or all clusters are compromised. To assure the communication security, inter-cluster multi-hop routing mechanism was designed based on constructing secure conjunct neighbor table. Finally, the updating parameter and the updating authentication number were introduced in rekeying phase. The analysis shows that the proposed scheme can meet the security requirement of key management, and it also has less computation cost and storage cost than the existing schemes.
AB - A ternary polynomial based key management (KMTP) scheme was proposed, which is effective in cluster based wireless sensor networks. Firstly, the base station will give each node one unique identifier to ensure the validity of the node. Then, algorithm of the inner-cluster and inter-cluster key pre-distribution based on the ternary polynomial of the same order was stated, which can ensure the value of the cracking threshold is bigger than the number of nodes of a cluster and all clusters separately, which means it's very hard to be cracked even all nodes of a cluster or all clusters are compromised. To assure the communication security, inter-cluster multi-hop routing mechanism was designed based on constructing secure conjunct neighbor table. Finally, the updating parameter and the updating authentication number were introduced in rekeying phase. The analysis shows that the proposed scheme can meet the security requirement of key management, and it also has less computation cost and storage cost than the existing schemes.
KW - Cluster
KW - Distance parameter
KW - Key management
KW - Ternary polynomial
KW - Wireless sensor network
UR - http://www.scopus.com/inward/record.url?scp=84892470416&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84892470416&partnerID=8YFLogxK
U2 - 10.3969/j.issn.1000-436x.2013.12.008
DO - 10.3969/j.issn.1000-436x.2013.12.008
M3 - Article
AN - SCOPUS:84892470416
VL - 34
SP - 71
EP - 78
JO - Tongxin Xuebao/Journal on Communications
JF - Tongxin Xuebao/Journal on Communications
SN - 1000-436X
IS - 12
ER -