Re-keying analysis in group key management of wireless sensor networks

被引:1
|
作者
Kumari, Prity [1 ]
Singh, Karam Ratan [1 ]
机构
[1] Natl Inst Technol Arunachal Pradesh, Basic & Appl Sci, Jote 791113, Arunachal Prade, India
关键词
BIBD; SBIBD; NRB; EBS; Re-keying; Collusion;
D O I
10.1007/s12095-023-00693-9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The exclusion basis system is a combinatorial formulation of group key management that provides long-term and flexible protection for wireless sensor networks while allowing for reasonable adjustment of the number of keys per node and the number of re-key messages. In this paper, we extend the work of Karst and Wicker to near-resolvable design, symmetric balanced incomplete block designs, and balanced incomplete block designs with the repetition count of a distinct pair of elements equal to one, and it is observed that near-resolvable design provides minimal re-keying compared to symmetric balanced incomplete block designs and balanced incomplete block designs. Also, near-resolvable design and exclusion basis system have the same re-keying size when the number of keys is n-1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$n-1$$\end{document}.
引用
收藏
页码:665 / 677
页数:13
相关论文
共 50 条
  • [1] Re-keying analysis in group key management of wireless sensor networks
    Prity Kumari
    Karam Ratan Singh
    Cryptography and Communications, 2024, 16 : 665 - 677
  • [2] An efficient re-keying scheme for cluster based wireless sensor networks
    Khan, Faraz Idris
    Jameel, Hassan
    Raazi, S. M. K.
    Khan, Adil Mehmood
    Huh, Eui Nam
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 2, PROCEEDINGS, 2007, 4706 : 1028 - 1037
  • [3] Stacking Ensemble Algorithm to Predict Re-keying in Group Key Management
    Kumari, Prity
    Singh, Karam Ratan
    Kumar, Ranjan
    ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2025,
  • [4] Secure group re-keying using key inverses
    El-Zoghdy, Said Fathy
    Asem, Yasser Mohammed
    JOURNAL OF HIGH SPEED NETWORKS, 2011, 18 (01) : 47 - 68
  • [5] Efficient re-keying scheme for group key distribution
    Jiang, Yixin
    Shi, Minghui
    Shen, Xuemin
    Lin, Chuang
    WCNC 2008: IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-7, 2008, : 2639 - +
  • [6] Scalable security in Wireless Sensor and Actuator Networks (WSANs): integration re-keying with routing
    Hu, Fei
    Siddiqui, Waqaas
    Sankar, Krishna
    COMPUTER NETWORKS, 2007, 51 (01) : 285 - 308
  • [7] Security in Wireless Actor & Sensor Networks (WASN): Towards a hierarchical re-keying design
    Hu, F
    Cao, XJ
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, 2005, : 528 - 533
  • [8] Adaptive Secured Multicast Key Management with Re-Keying Process
    Rafiq, Jahir Ibna
    Abdullah-Al-Omar
    Chakraborty, Animesh
    Yusuf, Albub
    2016 IEEE CONFERENCE ON SYSTEMS, PROCESS AND CONTROL (ICSPC), 2016, : 181 - 185
  • [9] A Novel Re-keying Function Protocol (NRFP) For Wireless Sensor Network Security
    Abdullah, Maan Younis
    Hua, Gui Wei
    Alsharabi, Naif
    SENSORS, 2008, 8 (12) : 7866 - 7881
  • [10] Increasing the lifetime of a key: A comparative analysis of the security of re-keying techniques
    Abdalla, M
    Bellare, M
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 546 - 559