HSKAS: A Novel Hierarchical Shared Key Authentication Scheme in Wireless Sensor Networks

被引:0
|
作者
Sun, Zeyu [1 ,2 ]
Ji, Xiaohui [1 ]
Li, Yuanbo [1 ]
机构
[1] Luoyang Inst Sci & Technol, Sch Comp & Informat Engn, Luoyang 471023, Peoples R China
[2] Xi An Jiao Tong Univ, Sch Elect & Informat Engn, Xian 710049, Peoples R China
基金
中国国家自然科学基金;
关键词
wireless sensor networks; shared key; secure communications; Authentication Scheme;
D O I
10.14257/ijsia.2016.10.4.12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks (WSNs) are often deployed in hostile environments, thus being subjected to great security risks. However, due to the influence of environment and dynamic topology, the communication radiuses of all nodes are no strictly consistent, which may cause different neighbor number and redundant neighbors for one central node. In this paper, we present a key agreement scheme without the trusted third parties by exploiting the special characteristics of Hopfield neural network: the two nodes converge in a steady state from their respective initial states after iterating finite times, while maintaining the confidentiality of the key by quantifying the key to strings. Compared to existing solution, the proposed method requires less memory and has lower communication overhead to key agreement.
引用
收藏
页码:105 / 116
页数:12
相关论文
共 50 条
  • [31] Fast Hierarchical Key Management Scheme With Transitory Master Key for Wireless Sensor Networks
    Gandino, Filippo
    Ferrero, Renato
    Montrucchio, Bartolomeo
    Rebaudengo, Maurizio
    IEEE INTERNET OF THINGS JOURNAL, 2016, 3 (06): : 1334 - 1345
  • [32] An efficient protocol for authentication and initial shared key establishment in clustered Wireless Sensor Networks
    Abraham, Jibi
    Ramanatha, K. S.
    2006 IFIP INTERNATIONAL CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS NETWORKS, 2006, : 190 - +
  • [33] A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks
    Ge, Mengmeng
    Choo, Kim-Kwang Raymond
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 462 - 475
  • [34] A NOVEL DYNAMIC KEY MANAGEMENT SCHEME FOR WIRELESS SENSOR NETWORKS
    Chen, Chen
    Huang, Zheng
    Wen, Qiaoyan
    Fan, Yajun
    2011 4TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK AND MULTIMEDIA TECHNOLOGY (4TH IEEE IC-BNMT2011), 2011, : 549 - 552
  • [35] Lightweight Authentication scheme for wireless sensor networks
    Huang, Chih-Hung
    Wu, Hsuan-Hsun
    Huang, Yu-Jung
    Lin, Wei-Cheng
    Pan, Chung-Long
    Chu, Shao-, I
    Chen, Po-Ying
    2012 IEEE GLOBAL HIGH TECH CONGRESS ON ELECTRONICS (GHTCE), 2012,
  • [36] Novel distributed key revocation scheme for wireless sensor networks
    Chao, Chih-Hung
    Yang, Ching-Fang
    Lin, Po-Ting
    Li, Jung-Shian
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (10) : 1271 - 1280
  • [37] An authentication scheme for clustered wireless sensor networks
    He, Li-Li
    Lou, Xiao-Chun
    Sensors and Transducers, 2013, 153 (06): : 166 - 170
  • [38] A dynamic password-based user authentication scheme for hierarchical wireless sensor networks
    Das, Ashok Kumar
    Sharma, Pranay
    Chatterjee, Santanu
    Sing, Jamuna Kanta
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (05) : 1646 - 1656
  • [39] EPKM:An Efficient and Practical Key Management Scheme for Hierarchical Wireless Sensor Networks
    Yang Wei
    Qi Yue
    Luo Xinqiang
    Wang Qin
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND SERVICE SYSTEM (CSSS), 2014, 109 : 697 - 700
  • [40] A Bezier Curve Based Key Management Scheme for Hierarchical Wireless Sensor Networks
    Shen, Yong-Luo
    Zhang, Jun
    Yang, Di-Wei
    Luo, Lin-Bo
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 2979 - +