Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks

碩士 === 元智大學 === 資訊工程學系 === 104 === Recently, the issue pertinent to sensor network security is a popular topic. Especially, due to the restriction of energy supplied by battery power of the sensors,symmetric cryptography is one of the suitable choices for the secret communication between sensors, wh...

Full description

Bibliographic Details
Main Authors: Jing-Yuan Rao, 饒敬遠
Other Authors: Chia-Mu Yu
Format: Others
Language:zh-TW
Published: 2016
Online Access:http://ndltd.ncl.edu.tw/handle/90634014504991862750
id ndltd-TW-104YZU05392082
record_format oai_dc
spelling ndltd-TW-104YZU053920822017-09-22T04:33:48Z http://ndltd.ncl.edu.tw/handle/90634014504991862750 Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks 感測器網路中對等仲介密鑰分配方案中的兩種變化 Jing-Yuan Rao 饒敬遠 碩士 元智大學 資訊工程學系 104 Recently, the issue pertinent to sensor network security is a popular topic. Especially, due to the restriction of energy supplied by battery power of the sensors,symmetric cryptography is one of the suitable choices for the secret communication between sensors, while asymmetric cryptography is not appropriate because of its heavy loading on computation should consume a lot of energy. As a result of using symmetric cryptography, there are numerous research papers focusing on designing efficient key management scheme in sensor networks. PIKE [3] designed by Chan and Perrig is a scheme using peer intermediaries and their pre-installed keys to deliver secret message from one sensor to another. However, they did not consider the case that the sensors are scattered in nonuniform way. Moreover, O(logn) is enough for sensor networks to achieve expander topology while PIKE has O(√n) storage overhead. In this paper, we give a generalizations of PIKE to offer more choices for developers under different requirements. The Constant Storage Protocol, abbreviated as CSP, costs constant memory storage and is more suitable for group-based deployment. Chia-Mu Yu 游家牧 2016 學位論文 ; thesis 18 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 元智大學 === 資訊工程學系 === 104 === Recently, the issue pertinent to sensor network security is a popular topic. Especially, due to the restriction of energy supplied by battery power of the sensors,symmetric cryptography is one of the suitable choices for the secret communication between sensors, while asymmetric cryptography is not appropriate because of its heavy loading on computation should consume a lot of energy. As a result of using symmetric cryptography, there are numerous research papers focusing on designing efficient key management scheme in sensor networks. PIKE [3] designed by Chan and Perrig is a scheme using peer intermediaries and their pre-installed keys to deliver secret message from one sensor to another. However, they did not consider the case that the sensors are scattered in nonuniform way. Moreover, O(logn) is enough for sensor networks to achieve expander topology while PIKE has O(√n) storage overhead. In this paper, we give a generalizations of PIKE to offer more choices for developers under different requirements. The Constant Storage Protocol, abbreviated as CSP, costs constant memory storage and is more suitable for group-based deployment.
author2 Chia-Mu Yu
author_facet Chia-Mu Yu
Jing-Yuan Rao
饒敬遠
author Jing-Yuan Rao
饒敬遠
spellingShingle Jing-Yuan Rao
饒敬遠
Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks
author_sort Jing-Yuan Rao
title Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks
title_short Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks
title_full Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks
title_fullStr Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks
title_full_unstemmed Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks
title_sort two variations of peer intermediaries for key establishment in sensor networks
publishDate 2016
url http://ndltd.ncl.edu.tw/handle/90634014504991862750
work_keys_str_mv AT jingyuanrao twovariationsofpeerintermediariesforkeyestablishmentinsensornetworks
AT ráojìngyuǎn twovariationsofpeerintermediariesforkeyestablishmentinsensornetworks
AT jingyuanrao gǎncèqìwǎnglùzhōngduìděngzhòngjièmìyàofēnpèifāngànzhōngdeliǎngzhǒngbiànhuà
AT ráojìngyuǎn gǎncèqìwǎnglùzhōngduìděngzhòngjièmìyàofēnpèifāngànzhōngdeliǎngzhǒngbiànhuà
_version_ 1718539498913005568