Loading...

2D Hash Chain robust Random Key Distribution scheme

Ehdaie, M ; Sharif University of Technology | 2016

574 Viewed
  1. Type of Document: Article
  2. DOI: 10.1016/j.ipl.2015.12.006
  3. Publisher: Elsevier , 2016
  4. Abstract:
  5. Many Random Key Distribution (RKD) schemes have been proposed in the literature to enable security applications in Wireless Sensor Networks (WSNs). A main security aspect of RKD schemes is their resistance against node capture attacks, since compromising the sensors and capturing their keys is a common risk in such networks. We propose a new method, based on a 2-Dimensional Hash Chain (2DHC), that can be applied on any RKD scheme to improve their resilience. Our method maintains the flexibility and low cost features of RKD schemes and it doesn't require any special-purpose hardware or extra memory to store keys in the sensors. We demonstrate that our approach significantly increases the resilience of RKD schemes against node capture at the cost of a few additional computations, while maintaining network connectivity at the same level. © 2015 Elsevier B.V. All rights reserved
  6. Keywords:
  7. Hash Chain ; Node capture ; Chains ; Network security ; Sensor nodes ; Distributed systems ; Hash chains ; Network connectivity ; Random key distribution ; Security application ; Special purpose hardware ; Wireless sensor network (WSNs) ; Wireless sensor networks
  8. Source: Information Processing Letters ; Volume 116, Issue 5 , 2016 , Pages 367-372 ; 00200190 (ISSN)
  9. URL: http://www.sciencedirect.com/science/article/pii/S0020019015002239