1 / 19

Informal Security Seminar: Key Pre-distribution Scheme for Wireless Sensor Networks

Informal Security Seminar: Key Pre-distribution Scheme for Wireless Sensor Networks. Joengmin Hwang Dept. Computer Science Univ. of Minnesota, Twin Cities. Overview. An optimal class of symmetric key generation systems – Blom sheme

chakra
Télécharger la présentation

Informal Security Seminar: Key Pre-distribution Scheme for Wireless Sensor Networks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Informal Security Seminar:Key Pre-distribution Scheme for Wireless Sensor Networks Joengmin Hwang Dept. Computer Science Univ. of Minnesota, Twin Cities

  2. Overview • An optimal class of symmetric key generation systems – Blom sheme • A pairwise key pre-distribution scheme for wireless sensor networks – Wenliang Du • A key pre-distribution scheme using deployment knowledge for wireless sensor networks

  3. Blom Schme • Pair-wise Key Approach • Need to store N-1 keys for each node when network size N • Security is perfect. • Need a lot of memory • Blom’s Scheme • Need to store ((k+2) key size)secrete information ( k+1 << N - 1 ) • Any pair of nodes can directly find a secret key • Tolerate compromise up to k nodes

  4. Blom Scheme • Basic Block • Public matrix G • Private matrix D(symmetric). D G k+1 k+1 N k+1

  5. Blom Scheme G:Public, D:Private and Symmetric K A = (D G)T G j i Kij i = N X Kji j N k+1 N K = A G = (D G)T G = GT DT G = GT D G = (A G)T = KT K: Symmetric ( Kij = Kji )

  6. Kij Kji Blom Scheme K A = (D G)T G j i Kij i = N X Kji j N k+1 N Node i carries: Node j carries:

  7. Key Pre-Distribution • Goal: Loading Keys into sensor nodes prior to deployment, s.t. any two nodes can find a secret key between them after deployment • Basic model: Eschenauer & Gligor Scheme • Optimization: • Blom’s schme • Pairwise Key • Using Deployment Knowledge

  8. A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks • Based on Blom’s Scheme: One key space (D, G) • To increase network’s resilience against node capture without using more memory • Using multiple key space (D1,…,D, G)

  9. Multiple Space Scheme Key-Space Pool: (D1, G) (D2, G),…,(D, G) spaces (ex.=3) (D1, G) (D2, G) (D3, G) (D1, G) (D4, G) (D5, G) Store j-th row of (DiG)T (D4, G) (D6, G) (D7, G)

  10. Krandom Multiple Space Scheme Key-Space Pool: (D1, G) (D2, G),…,(D, G) (D1, G) (D2, G) (D3, G) (D1, G) (D4, G) (D5, G) Store j-th row of Ai = (DiG)T (D4, G) (D6, G) (D7, G)

  11. Resilience (p = 0.33, m=200) Blom

  12. A Key Pre-Distribution Scheme Using Deployment Knowledge • Group based deployment model • Based on Blom’s scheme • Using deployment knowledge, reduce memory requirement • Rearrange transmission range

  13. A Key Pre-Distribution Scheme Using Deployment Knowledge Common Matrix G Secret Matrix Ai used to connect two nodes in the same group Secret Matrix Fj used to connect two nodes in the different groups A1 F1 F3 A2 F1F2 A3 F1

  14. A Key Pre-Distribution Scheme Using Deployment Knowledge Common Matrix G Secret Matrix Ai used to connect two nodes in the same group Secret Matrix Fj used to connect two nodes in the different groups A1 F1 F3 A2 F1F2 A3 F1

  15. A Key Pre-Distribution Scheme Using Deployment Knowledge Common Matrix G Secret Matrix Ai used to connect two nodes in the same group Secret Matrix Fj used to connect two nodes in the different groups A1 F1 F3 A2 F1F2 A3 F1

  16. A Key Pre-Distribution Scheme Using Deployment Knowledge • Assignment of F

  17. A Key Pre-Distribution Scheme Using Deployment Knowledge • Assignment of F

  18. A Key Pre-Distribution Scheme Using Deployment Knowledge

  19. A Key Pre-Distribution Scheme Using Deployment Knowledge

More Related