“…The threshold-based schemes [7,14] maintain network resiliency only when the number of compromised nodes is lesser than the threshold. The polynomial pool-based KPS [30] combines the idea of key pool [9,31] with poly-based KPS. In the scheme proposed in [30], the setup server randomly selects a subset of polynomials for each node.…”
Section: Related Workmentioning
confidence: 99%
“…The polynomial pool-based KPS [30] combines the idea of key pool [9,31] with poly-based KPS. In the scheme proposed in [30], the setup server randomly selects a subset of polynomials for each node. All the nodes are assigned with the polynomial shares selected from the corresponding subsets.…”
Section: Related Workmentioning
confidence: 99%
“…All the nodes are assigned with the polynomial shares selected from the corresponding subsets. The grid-based KPS [30] involve high storage and computational overhead. The peer intermediaries for key establishment scheme [32] requires trusted third party for key establishment.…”
“…The threshold-based schemes [7,14] maintain network resiliency only when the number of compromised nodes is lesser than the threshold. The polynomial pool-based KPS [30] combines the idea of key pool [9,31] with poly-based KPS. In the scheme proposed in [30], the setup server randomly selects a subset of polynomials for each node.…”
Section: Related Workmentioning
confidence: 99%
“…The polynomial pool-based KPS [30] combines the idea of key pool [9,31] with poly-based KPS. In the scheme proposed in [30], the setup server randomly selects a subset of polynomials for each node. All the nodes are assigned with the polynomial shares selected from the corresponding subsets.…”
Section: Related Workmentioning
confidence: 99%
“…All the nodes are assigned with the polynomial shares selected from the corresponding subsets. The grid-based KPS [30] involve high storage and computational overhead. The peer intermediaries for key establishment scheme [32] requires trusted third party for key establishment.…”
“…In recent years, issue of key distribution and user authentication mechanisms received a substantial attention from researchers . Various schemes to authenticate users in WSNs have been designed as discussed in the review of , but most of these schemes are at risk of one or other security attacks.…”
“…To address the drawback, Huang et al [9] proposed a structure of dual hash chains, but the structure introduces high computational overheads by adopting a high-order polynomial. In [10], Nguyen et al proposed to use location information of sensor nodes to improve the secure connectivity, however, since the final positions of nodes are difficult to determined, the scheme that uses much deployment knowledge is controversial. In our previous work [15], WSN life-time improvement has been analyzed by introducing heterogeneous nodes.…”
Many wireless sensor networks (WSNs) consist of a large number of distributed sensor nodes that are batteries powered, vulnerable to tampering, and equipped with limited computational capabilities and memory. These characteristics render WSNs facing many security threats, which require cryptographic security mechanisms for secure communication, key revocation and management of security issues arising from the addition of new nodes. In this paper, we propose a key management scheme to meet the security requirements of wireless sensor networks. The scheme relies on the theory of random graph to build a fully secure connectivity for distributed sensor nodes. It uses heterogeneous structure to limit ranges of attacks, and utilizes hash chains to realize authentication of pool keys and broadcast messages of auxiliary nodes. The security and network connectivity characteristics supported by the key management scheme are discussed and simulation experiments are presented.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.