DocumentCode :
2954156
Title :
A key management for non-uniform security environment
Author :
Huang Jin-Wang ; Li Guang-Ming ; Sheng Yan ; Wu Zhong-Liang ; Feng Jiu-Chao
Author_Institution :
Sch. of Electron. & Inf. Eng., South China Univ. of Technol., Guangzhou, China
fYear :
2013
fDate :
17-19 Dec. 2013
Firstpage :
290
Lastpage :
297
Abstract :
Key management is very important for Wireless Sensor Networks´ (WSNs) security. Many key management protocols have been proposed recently. However, most of them assume that the area which nodes monitored is equal security, and the probability of nodes being compromised to be the same for every node. In some application environments(e.g. in battle field), the probability of nodes being compromised in an enemy controlled area is larger than in our controlled area. In this paper, a key management method for such application environment which the security is non-uniform is proposed. The optimization for the tradeoff between storage and calculation overhead for Blom Matrix is taken into account; the secret symmetric matrix is generated by conjugate chaotic sequence, it is easy to implemented in physical circuit and more secure.
Keywords :
cryptographic protocols; matrix algebra; wireless sensor networks; Blom matrix; enemy controlled area; key management method; key management protocol; nonuniform security environment; secret symmetric matrix; wireless sensor networks; Base stations; Chaotic communication; Encryption; Symmetric matrices; Vectors; Wireless sensor networks; Blom Matrix; WSNs; chaos; key management; security non-uniform;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wavelet Active Media Technology and Information Processing (ICCWAMTIP), 2013 10th International Computer Conference on
Conference_Location :
Chengdu
Print_ISBN :
978-1-4799-2445-5
Type :
conf
DOI :
10.1109/ICCWAMTIP.2013.6716651
Filename :
6716651
Link To Document :
بازگشت