2019
DOI: 10.1109/access.2019.2900390
|View full text |Cite
|
Sign up to set email alerts
|

Non-Interactive Group Key Pre-Distribution Scheme (GKPS) for End-to-End Routing in Wireless Sensor Networks

Abstract: A novel design of secure end-to-end routing protocol in wireless sensor networks was recently proposed by Harn et al. Their design is based on a group key pre-distribution scheme (GKPS) using a multivariate polynomial. A group key also called a path key, is used to protect data transmitted in the entire routing path. Specifically, instead of using a link-to-link secure communication that uses multiple pairwise shared keys, it is an end-to-end secure communication that uses a single path key to protect data ove… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 22 publications
(26 citation statements)
references
References 19 publications
0
26
0
Order By: Relevance
“…At present, some energy-efficient group key management schemes have been proposed for WSN. For example, in [30][31][32][33][34][35], some group key management schemes based on key tree are proposed for WSN, but the performance of these schemes is limited by the structure of key tree. In [30], the EBS scheme (exclusion basis systems, EBS) using combinatorial mathematics theory is proposed for group key management, and a group key management scheme based on EBS and t-degree binary polynomials is proposed in [31], but the problem that EBS is vulnerable to collusion attack is not considered in these schemes.…”
Section: Group Keymentioning
confidence: 99%
See 2 more Smart Citations
“…At present, some energy-efficient group key management schemes have been proposed for WSN. For example, in [30][31][32][33][34][35], some group key management schemes based on key tree are proposed for WSN, but the performance of these schemes is limited by the structure of key tree. In [30], the EBS scheme (exclusion basis systems, EBS) using combinatorial mathematics theory is proposed for group key management, and a group key management scheme based on EBS and t-degree binary polynomials is proposed in [31], but the problem that EBS is vulnerable to collusion attack is not considered in these schemes.…”
Section: Group Keymentioning
confidence: 99%
“…In [30], the EBS scheme (exclusion basis systems, EBS) using combinatorial mathematics theory is proposed for group key management, and a group key management scheme based on EBS and t-degree binary polynomials is proposed in [31], but the problem that EBS is vulnerable to collusion attack is not considered in these schemes. The logical key hierarchy (LKH) scheme supports deleting multiple members at once and has the ability to prevent the deleted members from jointly negotiating to obtain the new group key [32][33][34][35], but the group controller (GC) is responsible for all the security management, which is vulnerable to form a bottleneck problem called single point failure. Based on the LKH scheme, a group key distribution scheme based on the geographic information and routing information of nodes is proposed [34], which consumes less energy to distribute and update the group key than LKH scheme, but there is also the problem of single point failure.…”
Section: Group Keymentioning
confidence: 99%
See 1 more Smart Citation
“…Identity authentication is mainly used to determine the sender of information and exchange communication keys between two communication parties. Since nodes in a WSN are relatively easy for attackers to capture, we can use identity authentication mechanisms to verify the captured nodes [12][13][14][15]. Due to the constrained computing and energy capabilities, identity authentication via a symmetric key algorithm is more feasible than the traditional approach based on public key encryption in WSNs [3,16].…”
Section: Related Workmentioning
confidence: 99%
“…There are various works that has been carried out towards key predistribution in WSN. Most recently, the work of Albakhri and Harn [11] have used probabilistic scheme using group key based predistribution of the keys using multivariate polynomial scheme. Consideration of the mobility factor using Gandino et al [12] where the q-s composite technique has been adopted for an effective design of key distribution policy in WSN.…”
Section: A Backgroundmentioning
confidence: 99%