Re-keying analysis in group key management of wireless sensor networks

被引:1
|
作者
Kumari, Prity [1 ]
Singh, Karam Ratan [1 ]
机构
[1] Natl Inst Technol Arunachal Pradesh, Basic & Appl Sci, Jote 791113, Arunachal Prade, India
关键词
BIBD; SBIBD; NRB; EBS; Re-keying; Collusion;
D O I
10.1007/s12095-023-00693-9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The exclusion basis system is a combinatorial formulation of group key management that provides long-term and flexible protection for wireless sensor networks while allowing for reasonable adjustment of the number of keys per node and the number of re-key messages. In this paper, we extend the work of Karst and Wicker to near-resolvable design, symmetric balanced incomplete block designs, and balanced incomplete block designs with the repetition count of a distinct pair of elements equal to one, and it is observed that near-resolvable design provides minimal re-keying compared to symmetric balanced incomplete block designs and balanced incomplete block designs. Also, near-resolvable design and exclusion basis system have the same re-keying size when the number of keys is n-1\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$n-1$$\end{document}.
引用
收藏
页码:665 / 677
页数:13
相关论文
共 50 条
  • [41] A group-based dynamic key management scheme in wireless sensor networks
    Li, Guorui
    He, Jingsha
    Fu, Yingfang
    21ST INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING AND APPLICATIONS WORKSHOPS/SYMPOSIA, VOL 2, PROCEEDINGS, 2007, : 127 - +
  • [42] A robust group-based key management scheme for wireless sensor networks
    Yu, Z
    Guan, Y
    2005 IEEE Wireless Communications and Networking Conference, Vols 1-4: WCNC 2005: BROADBAND WIRELESS FOR THE MASSES READY FOR TAKE-OFF., 2005, : 1915 - 1920
  • [43] Security Analysis of Deterministic Re-keying with Masking and Shuffling: Application to ISAP
    Udvarhelyi, Balazs
    Bronchain, Olivier
    Standaert, Francois-Xavier
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, COSADE 2021, 2021, 12910 : 168 - 183
  • [44] Topological Key Hierarchy for Energy-Efficient Group Key Management in Wireless Sensor Networks
    Ju-Hyung Son
    Jun-Sik Lee
    Seung-Woo Seo
    Wireless Personal Communications, 2010, 52 : 359 - 382
  • [45] HRKT: A Hierarchical Route Key Tree based Group Key Management for Wireless Sensor Networks
    Jiang, Rong
    Luo, Jun
    Wang, Xiaoping
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (08): : 2042 - 2060
  • [46] Topological Key Hierarchy for Energy-Efficient Group Key Management in Wireless Sensor Networks
    Son, Ju-Hyung
    Lee, Jun-Sik
    Seo, Seung-Woo
    WIRELESS PERSONAL COMMUNICATIONS, 2010, 52 (02) : 359 - 382
  • [47] Side-Channel Analysis for the Re-Keying Protocol of Bluetooth Low Energy
    Pei Cao
    Chi Zhang
    Xiang-Jun Lu
    Hai-Ning Lu
    Da-Wu Gu
    Journal of Computer Science and Technology, 2023, 38 : 1132 - 1148
  • [48] Provably secure counter mode with related-key-based internal re-keying
    Evgeny K. Alekseev
    Kirill S. Goncharenko
    Grigory B. Marshalko
    Journal of Computer Virology and Hacking Techniques, 2020, 16 : 285 - 294
  • [49] Distributed Key Management for Wireless Sensor Networks
    Kuldeep
    Garimella, Ramamurthy
    Q2SWINET09: PROCEEDING OF THE FIFTH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2009, : 23 - 28
  • [50] Adaptive Key Management for Wireless Sensor Networks
    Cheneau, Tony
    Ranganathan, Mudumbai
    2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 395 - 401