DocumentCode :
1192528
Title :
Key establishment schemes against storage-bounded adversaries in wireless sensor networks
Author :
Tsai, Shi-Chun ; Tzeng, Wen-Guey ; Zhou, Kun-Yi
Author_Institution :
Comput. Sci. Dept., Nat. Chiao Tung Univ., Hsinchu
Volume :
8
Issue :
3
fYear :
2009
fDate :
3/1/2009 12:00:00 AM
Firstpage :
1218
Lastpage :
1222
Abstract :
In this paper we re-examine the attacking scenario about wireless sensor networks. It is generally assumed that the adversary picks up all radio communications of sensor nodes without any loss and stores the eavesdropped messages for later use. We suggest that in some situations the adversary may not be able to pick up all radio communications of sensor nodes. Therefore, we propose the storage-bounded adversary model for wireless sensor networks, in which the adversary´s storage is bounded. We propose two key establishment schemes for establishing shared keys for neighboring sensor nodes in the storage-bounded adversary model. The first scheme needs special beacon nodes for broadcasting random bits. In the second scheme, some sensor nodes play the role of beacon nodes. Our results are theoretical in some sense. Nevertheless, we can adjust them for realistic consideration.
Keywords :
broadcasting; cryptography; telecommunication security; wireless sensor networks; key establishment scheme; radio communication; random bit broadcasting; storage-bounded adversary model; wireless sensor network; Computer science; Cryptography; Data security; Message authentication; Quantum computing; Radio broadcasting; Radio communication; Radio link; Scattering; Wireless sensor networks; Bounded-storage model; key establishment; unconditional security; wireless sensor network;
fLanguage :
English
Journal_Title :
Wireless Communications, IEEE Transactions on
Publisher :
ieee
ISSN :
1536-1276
Type :
jour
DOI :
10.1109/TWC.2009.081048
Filename :
4801474
Link To Document :
بازگشت