• DocumentCode
    2909323
  • Title

    An efficient end to end key establishment protocol for wireless sensor networks

  • Author

    Fanian, Ali ; Berenjkoub, Mehdi

  • Author_Institution
    Dept. of Electr. & Comput. Eng., Isfahan Univ. of Technol. (IUT), Isfahan, Iran
  • fYear
    2012
  • fDate
    13-14 Sept. 2012
  • Firstpage
    73
  • Lastpage
    79
  • Abstract
    Sensor networks are suitable candidates for military and scientific applications such as border security and environmental monitoring. They are usually deployed in unattended or hostile environments so security is a major concern with these networks. A fundamental requirement is the capability to establish pairwise keys between sensors. Many key establishment protocols have been proposed to address the security issues in wireless sensor networks. However, most of these have security or performance limitations. In this paper, we propose a new key establishment protocol based on symmetric polynomials. In our protocol, contrary to other works, we use a lot of symmetric polynomials to generate polynomial shares for a group of sensors, and the distribution of polynomial shares to each sensor is done by combinatorial design. Since, a limited number of shares are generated from a symmetric polynomial; the polynomial degree is very low. As a result, the common key between sensors can be generated without imposing overhead to them.
  • Keywords
    cryptographic protocols; telecommunication security; wireless sensor networks; border security; end to end key establishment protocol; environmental monitoring; hostile environments; military applications; pairwise keys; scientific applications; symmetric polynomials; wireless sensor networks; Cryptography; Knowledge engineering; Polynomials; Protocols; Symmetric matrices; Wireless sensor networks; Wireless sensor networks; combinatorial design; deployment knowledge; key management; network security; random key pre-distribution; symmetric polynomial;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Security and Cryptology (ISCISC), 2012 9th International ISC Conference on
  • Conference_Location
    Tabriz
  • Print_ISBN
    978-1-4673-2387-1
  • Type

    conf

  • DOI
    10.1109/ISCISC.2012.6408194
  • Filename
    6408194