- 1、本文档共28页,可阅读全部内容。
- 2、有哪些信誉好的足球投注网站(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks-英文文献
A Pairwise Key Pre-Distribution Scheme for
Wireless Sensor Networks
WENLIANG DU and JING DENG
Syracuse University
YUNGHSIANG S. HAN
National Chi Nan University, Taiwan
PRAMOD K. VARSHNEY
Syracuse University
and
JONATHAN KATZ and ARAM KHALILI
University of Maryland, College Park
To achieve security in wireless sensor networks, it is important to be able to encrypt and authenticate messages
sent between sensor nodes. Before doing so, keys for performing encryption and authentication must be agreed
upon by the communicating parties. Due to resource constraints, however, achieving key agreement in wireless
sensor networks is non-trivial. Many key agreement schemes used in general networks, such as Diffie-Hellman
and other public-key based schemes, are not suitable for wireless sensor networks due to the limited computational
abilities of the sensor nodes. Pre-distribution of secret keys for all pairs of nodes is not viable due to the large
amount of memory this requires when the network size is large. To solve the key pre-distribution problem, two
elegant key pre-distribution approaches have been proposed recently.
In this paper, we provide a framework in which to study the security of key pre-distribution schemes, propose a
new key pre-distribution scheme which substantially improves the resilience of the network compared to previous
schemes, and give an in-depth analysis of our scheme in terms of network resilience and associated overhead. Our
scheme exhibits a nice threshold property: when the number of compromised nodes is less than the threshold, the
probability that communications between any additional nodes are compromised is close to zero. This desirable
property lowers the initial payoff of smaller-scale network breaches to an adversary, and makes it necessary for
the adversary to attack a large fraction of the network before it can achieve any significant gain.
Categories and Subject Descriptors: C.2.0 [Computer-Communication N
您可能关注的文档
- A Learning Algorithm for Continually Running Fully Recurrent Neural Networks-英文文献.pdf
- A Limited Memory Algorithm for Bound Constrained Optimization-英文文献.pdf
- A Long-Memory Property of Stock Market Returns and a New Model-英文文献.pdf
- A message ferrying approach for data delivery in sparse mobile ad hoc networks-英文文献.pdf
- A learning algorithm for Boltzmann machines-英文文献.pdf
- A Meta-Analytic Review of Experiments Examining the Effects of Extrinsic Rewards on Intrinsic Motivation-英文文献.pdf
- A Model of Saliency-based Visual Attention for Rapid Scene Analysis-英文文献.pdf
- A New Extension of the Kalman Filter to Nonlinear Systems-英文文献.pdf
- A New Kind of Science-英文文献.pdf
- A Morphable Model For The Synthesis Of 3D Faces-英文文献.pdf
- 2025至2031年中国电荷灵敏前置放大器行业投资前景及策略咨询研究报告.docx
- 2025至2031年中国电脑音箱行业投资前景及策略咨询研究报告.docx
- 高中主题班会 高二下学期校园用电安全教育主题班会课件.pptx
- 2025至2031年中国电脑提字提花松紧带行业投资前景及策略咨询研究报告.docx
- 2025至2031年中国电脑婴儿培养箱行业投资前景及策略咨询研究报告.docx
- 高中主题班会 高二下学期预防校园欺凌主题班会课件.pptx
- 客户投诉处理结果统计分析报告反馈管理制度 .ppt
- 2025至2031年中国电脑执手锁芯行业投资前景及策略咨询研究报告.docx
- 2025至2031年中国电脑提花T恤衫行业投资前景及策略咨询研究报告.docx
- 冠心病的体征、诊断和治疗方法.pptx
文档评论(0)