2018
DOI: 10.14569/ijacsa.2018.090721
|View full text |Cite
|
Sign up to set email alerts
|

Performance Evaluation of Polynomial Pool-Based Key Pre-Distribution Protocol for Wireless Sensor Network Applications

Abstract: Abstract-In nowadays, wireless sensor network (WSN) has been established as a leading emerging technology in the field of remote area distributed sensing due to its diverse application areas. Key pre-distribution is an important task in WSN because after the deployment of sensor nodes, their neighbors become strange to each other. To secure the communication, neighbor nodes have to generate a secret shared key, or a key-path must exist between these nodes. In this paper, we have discussed and presented various… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 8 publications
(6 reference statements)
0
2
0
Order By: Relevance
“…Obviously, according to Equation (27), the key of each time slice is different and the common node only needs to calculate the coefficients a i+1 and b i+1 combined with the former authentication K i to work out the authentication key K i+1 of the (i + 1) − th time slice.…”
Section: Forward Broadcast Authentication Key Managementmentioning
confidence: 99%
See 1 more Smart Citation
“…Obviously, according to Equation (27), the key of each time slice is different and the common node only needs to calculate the coefficients a i+1 and b i+1 combined with the former authentication K i to work out the authentication key K i+1 of the (i + 1) − th time slice.…”
Section: Forward Broadcast Authentication Key Managementmentioning
confidence: 99%
“…However, because the key sharing rate between nodes is low and these schemes do not support identity authentication, attackers can easily carry out various malicious attacks by using the obtained key information. The key pre-distribution schemes based on polynomial keys pool, such as the key pre-distribution in wireless sensor networks using multivariate polynomials [ 24 ], the key pre-distribution scheme based on matrix [ 25 , 26 ] and the key pre-distribution scheme based on configuration knowledge [ 27 , 28 ], etc. These schemes are generally able to resist capture attacks and have high security and good network connectivity, but they have large calculation cost and do not support identity authentication of neighbor nodes, and the network scalability is not strong to be good for the new nodes joining.…”
Section: Introductionmentioning
confidence: 99%