Advertisement

Modeling Key Infection in Large-Scale Sensor Networks

  • Feiyang Peng
  • Zhihong Liu
  • Yong Zeng
  • Jialei Wang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10631)

Abstract

Key infection is a lightweight security protocol suitable for large-scale sensor networks. In this paper, we first derive a probabilistic model to analyze the security of key infection, then propose a group based key infection to improve its security performance.

Keywords

Key management Key infection Secrecy amplification Sensor networks 

Notes

Acknowledgments

This work was supported by the National Key Research and Development Program of China (2016YFB0800601), the National Natural Science Foundation of China (61671360, 61173135), and in part by the Natural Science Basic Research Plan in Shaanxi Province of China (2017JM6082).

References

  1. 1.
    Ding, J., Bouabdallah, A., Tarokh, V.: Key pre-distributions from graph-based block designs. IEEE Sens. J. 16(6), 1842–1850 (2016)CrossRefGoogle Scholar
  2. 2.
    Bechkit, W., Challal, Y., Bouabdallah, A., Tarokh, V.: A highly scalable key pre-distribution scheme for wireless sensor networks. IEEE Trans. Wirel. Commun. 12(2), 948–959 (2013)CrossRefGoogle Scholar
  3. 3.
    Eschenauer, L., Gligor, V.: A key-management scheme for distributed sensor networks, In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47. ACM Press, Washington (2002)Google Scholar
  4. 4.
    Yağan, O., Makowski, A.M.: Wireless sensor networks under the random pairwise key predistribution scheme: can resiliency be achieved with small key rings? IEEE/ACM Trans. Netw. 24(6), 3383–3396 (2016)CrossRefGoogle Scholar
  5. 5.
    Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: INFOCOM 2004, pp. 586–597. IEEE Press, New York (2004)Google Scholar
  6. 6.
    Choi, J., Bang, J., Kim, L., Ahn, M., Kwon, T.: Location-based key management strong against insider threats in wireless sensor networks. IEEE Syst. J. 11(2), 494–502 (2017)CrossRefGoogle Scholar
  7. 7.
    Anderson, R., Chan, H., Perrig, A.: Key infection: smart trust for smart dust. In: IEEE International Conference on Network Protocols, pp. 206–215. IEEE Press, New York (2004)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.School of Cyber EngineeringXidian UniversityXi’anChina

Personalised recommendations