Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks
碩士 === 元智大學 === 資訊工程學系 === 104 === Recently, the issue pertinent to sensor network security is a popular topic. Especially, due to the restriction of energy supplied by battery power of the sensors,symmetric cryptography is one of the suitable choices for the secret communication between sensors, wh...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2016
|
Online Access: | http://ndltd.ncl.edu.tw/handle/90634014504991862750 |
id |
ndltd-TW-104YZU05392082 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-104YZU053920822017-09-22T04:33:48Z http://ndltd.ncl.edu.tw/handle/90634014504991862750 Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks 感測器網路中對等仲介密鑰分配方案中的兩種變化 Jing-Yuan Rao 饒敬遠 碩士 元智大學 資訊工程學系 104 Recently, the issue pertinent to sensor network security is a popular topic. Especially, due to the restriction of energy supplied by battery power of the sensors,symmetric cryptography is one of the suitable choices for the secret communication between sensors, while asymmetric cryptography is not appropriate because of its heavy loading on computation should consume a lot of energy. As a result of using symmetric cryptography, there are numerous research papers focusing on designing efficient key management scheme in sensor networks. PIKE [3] designed by Chan and Perrig is a scheme using peer intermediaries and their pre-installed keys to deliver secret message from one sensor to another. However, they did not consider the case that the sensors are scattered in nonuniform way. Moreover, O(logn) is enough for sensor networks to achieve expander topology while PIKE has O(√n) storage overhead. In this paper, we give a generalizations of PIKE to offer more choices for developers under different requirements. The Constant Storage Protocol, abbreviated as CSP, costs constant memory storage and is more suitable for group-based deployment. Chia-Mu Yu 游家牧 2016 學位論文 ; thesis 18 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 元智大學 === 資訊工程學系 === 104 === Recently, the issue pertinent to sensor network security is a popular topic. Especially, due to the restriction of energy supplied by battery power of the sensors,symmetric cryptography is one of the suitable choices for the secret communication between sensors, while asymmetric cryptography is not appropriate because of its heavy loading on computation should consume a lot of energy. As a result of using symmetric cryptography, there are numerous research papers focusing on designing efficient key management scheme in sensor networks. PIKE [3] designed by Chan and Perrig is a scheme using peer intermediaries and their pre-installed keys to deliver secret message from one sensor to another. However, they did not consider the case that the sensors are scattered in nonuniform way. Moreover, O(logn) is enough for sensor networks to achieve expander topology while PIKE has O(√n) storage overhead. In this paper, we give a generalizations of PIKE to offer more choices for developers under different requirements. The Constant Storage Protocol, abbreviated as CSP, costs constant memory storage and is more suitable for group-based deployment.
|
author2 |
Chia-Mu Yu |
author_facet |
Chia-Mu Yu Jing-Yuan Rao 饒敬遠 |
author |
Jing-Yuan Rao 饒敬遠 |
spellingShingle |
Jing-Yuan Rao 饒敬遠 Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks |
author_sort |
Jing-Yuan Rao |
title |
Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks |
title_short |
Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks |
title_full |
Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks |
title_fullStr |
Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks |
title_full_unstemmed |
Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks |
title_sort |
two variations of peer intermediaries for key establishment in sensor networks |
publishDate |
2016 |
url |
http://ndltd.ncl.edu.tw/handle/90634014504991862750 |
work_keys_str_mv |
AT jingyuanrao twovariationsofpeerintermediariesforkeyestablishmentinsensornetworks AT ráojìngyuǎn twovariationsofpeerintermediariesforkeyestablishmentinsensornetworks AT jingyuanrao gǎncèqìwǎnglùzhōngduìděngzhòngjièmìyàofēnpèifāngànzhōngdeliǎngzhǒngbiànhuà AT ráojìngyuǎn gǎncèqìwǎnglùzhōngduìděngzhòngjièmìyàofēnpèifāngànzhōngdeliǎngzhǒngbiànhuà |
_version_ |
1718539498913005568 |