Randomized and Set-System Based Collusion Resistant Key Predistribution Schemes (Brief Announcement)
- 538 Downloads
One problem that frequently arises is the establishment of a secure connection between two network nodes. There are many key establishment protocols that are based on Trusted Third Parties or public key cryptography which are in use today. However, in the case of networks with frequently changing topology, such an approach is difficult to apply. In this paper we give a formal definition of collusion resistant key predistribution schemes and then propose such a scheme based on probabilistically created set systems. The resulting key sets are shown to have a number of desirable properties that ensure the confidentiality of communication sessions against collusion attacks by other network nodes. Moreover we associate our deterministic key pre-distribution scheme with the theory of set family construction methods showing that the mathematical properties possessed by the sets of such families lead to key sets with the aforementioned desirable properties.
KeywordsKey management Key pre-distribution Ad-hoc network security Set systems
- 2.Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, Berkeley, California, vol. 197 (2003)Google Scholar
- 3.Delgosha, F., Fekri, F.: Key pre-distribution in wireless sensor networks using multivariate polynomials. In: 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, IEEE SECON 2005, pp. 118–129. IEEE (2005)Google Scholar
- 5.Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47. ACM (2002)Google Scholar
- 8.Lee, J., Stinson, D.R.: A combinatorial approach to key predistribution for distributed sensor networks. In: WCNC, pp. 1200–1205 (2005)Google Scholar