A Novel Key Management Scheme based on SKMaS in wireless sensor networks
碩士 === 東海大學 === 資訊工程學系 === 103 === In this paper we propose a symmetric cryptographic approach, named the Novel Key Management Scheme (NKMaS for short), in which a sensor node, called the Key Distribution Server (KDS for short), is responsible for the key management of the NKMaS. When the system sta...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | en_US |
Published: |
2015
|
Online Access: | http://ndltd.ncl.edu.tw/handle/53089757472577212927 |
id |
ndltd-TW-103THU00394028 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-103THU003940282016-08-19T04:10:33Z http://ndltd.ncl.edu.tw/handle/53089757472577212927 A Novel Key Management Scheme based on SKMaS in wireless sensor networks 一個在無線感測網路中基於SKMaS的金鑰管理機制 FENG-CHING CHIANG 江豐慶 碩士 東海大學 資訊工程學系 103 In this paper we propose a symmetric cryptographic approach, named the Novel Key Management Scheme (NKMaS for short), in which a sensor node, called the Key Distribution Server (KDS for short), is responsible for the key management of the NKMaS. When the system starts up, the KDS establishes a key matrix K of n×n, and sends its control key K_0,0, its individual key K_1,1, key-cross i and key-table i in which key-cross i as a part of K contains the communication keys (CKs for short) with which node i can communicate with node j, 2≤j≤n,j≠i, and key-cross i 4×4 table used to generate CKs. With node IDs, two arbitrary valid sensor nodes, e.g., i and j, can individually identify the corresponding CKs, i.e., k_(i,j) and k_(j,i), in their own key-crosses with which to derive a dynamic shared key (DSK) for encrypting/decrypting messages transmitted between them. When i leaves the underlying network, the corresponding CKs and the individually keys currently utilized by i can be reused by a newly joining sensor, e.g., h. However, when h joins the network, if no such previously-used IDs are available, h will be given a new ID, i.e., n+1, key-cross h, K_0,0, K_1,1 and key-table h by the KDS. The KDS sends a newly-joining message which contains two seeds with which node i can generate K_(i,n+1) and K_(n+1,i), to i,2≤i≤n, i≠h. With K_(i,n+1) and K_(n+1,i), i can communicate with h. The lemmas and security analyzed in this paper prove that the proposed system can protect at least three common attacks, Eavesdropping attack、Forgery KDS attack and Forgery sensor node attack. Fang-Yie Leu 呂芳懌 2015 學位論文 ; thesis 41 en_US |
collection |
NDLTD |
language |
en_US |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 東海大學 === 資訊工程學系 === 103 === In this paper we propose a symmetric cryptographic approach, named the Novel Key Management Scheme (NKMaS for short), in which a sensor node, called the Key Distribution Server (KDS for short), is responsible for the key management of the NKMaS. When the system starts up, the KDS establishes a key matrix K of n×n, and sends its control key K_0,0, its individual key K_1,1, key-cross i and key-table i in which key-cross i as a part of K contains the communication keys (CKs for short) with which node i can communicate with node j, 2≤j≤n,j≠i, and key-cross i 4×4 table used to generate CKs. With node IDs, two arbitrary valid sensor nodes, e.g., i and j, can individually identify the corresponding CKs, i.e., k_(i,j) and k_(j,i), in their own key-crosses with which to derive a dynamic shared key (DSK) for encrypting/decrypting messages transmitted between them. When i leaves the underlying network, the corresponding CKs and the individually keys currently utilized by i can be reused by a newly joining sensor, e.g., h. However, when h joins the network, if no such previously-used IDs are available, h will be given a new ID, i.e., n+1, key-cross h, K_0,0, K_1,1 and key-table h by the KDS. The KDS sends a newly-joining message which contains two seeds with which node i can generate K_(i,n+1) and K_(n+1,i), to i,2≤i≤n, i≠h. With K_(i,n+1) and K_(n+1,i), i can communicate with h. The lemmas and security analyzed in this paper prove that the proposed system can protect at least three common attacks, Eavesdropping attack、Forgery KDS attack and Forgery sensor node attack.
|
author2 |
Fang-Yie Leu |
author_facet |
Fang-Yie Leu FENG-CHING CHIANG 江豐慶 |
author |
FENG-CHING CHIANG 江豐慶 |
spellingShingle |
FENG-CHING CHIANG 江豐慶 A Novel Key Management Scheme based on SKMaS in wireless sensor networks |
author_sort |
FENG-CHING CHIANG |
title |
A Novel Key Management Scheme based on SKMaS in wireless sensor networks |
title_short |
A Novel Key Management Scheme based on SKMaS in wireless sensor networks |
title_full |
A Novel Key Management Scheme based on SKMaS in wireless sensor networks |
title_fullStr |
A Novel Key Management Scheme based on SKMaS in wireless sensor networks |
title_full_unstemmed |
A Novel Key Management Scheme based on SKMaS in wireless sensor networks |
title_sort |
novel key management scheme based on skmas in wireless sensor networks |
publishDate |
2015 |
url |
http://ndltd.ncl.edu.tw/handle/53089757472577212927 |
work_keys_str_mv |
AT fengchingchiang anovelkeymanagementschemebasedonskmasinwirelesssensornetworks AT jiāngfēngqìng anovelkeymanagementschemebasedonskmasinwirelesssensornetworks AT fengchingchiang yīgèzàiwúxiàngǎncèwǎnglùzhōngjīyúskmasdejīnyàoguǎnlǐjīzhì AT jiāngfēngqìng yīgèzàiwúxiàngǎncèwǎnglùzhōngjīyúskmasdejīnyàoguǎnlǐjīzhì AT fengchingchiang novelkeymanagementschemebasedonskmasinwirelesssensornetworks AT jiāngfēngqìng novelkeymanagementschemebasedonskmasinwirelesssensornetworks |
_version_ |
1718378769601789952 |