| Literature DB >> 25264955 |
Zhongyuan Qin1, Xinshuai Zhang2, Kerong Feng3, Qunfang Zhang4, Jie Huang5.
Abstract
With the rapid development and widespread adoption of wireless sensor networks (WSNs), security has become an increasingly prominent problem. How to establish a session key in node communication is a challenging task for WSNs. Considering the limitations in WSNs, such as low computing capacity, small memory, power supply limitations and price, we propose an efficient identity-based key management (IBKM) scheme, which exploits the Bloom filter to authenticate the communication sensor node with storage efficiency. The security analysis shows that IBKM can prevent several attacks effectively with acceptable computation and communication overhead.Entities:
Mesh:
Year: 2014 PMID: 25264955 PMCID: PMC4239946 DOI: 10.3390/s141017937
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1.Example of a Bloom filter.
Figure 2.Network model of WSN.
List of the notations used.
| A cyclic additive group of prime order | |
| A cyclic multiplicative group of prime order | |
| A random elliptic curve | |
| A point on | |
| Large prime numbers | |
| A bilinear mapping function | |
| Hash function | |
| Symmetric encryption with key | |
| T | A time stamp |
| Random number | |
| Identity of cluster head | |
| Identity of node | |
| Public key and private key of | |
| Public key and private key of Node | |
| Shared secret key between cluster head and node | |
| Shared secret key between two nodes in a cluster |
Figure 3.Procedure of node registration.
Figure 4.CH generates its own cluster Bloom filter.
Figure 5.Share secret key generation between two nodes.
Figure 6.Minimum probability of false positives.
Figure 7.Comparison of memory overhead. IBKM, identity-based key management.
Time consumption of major operations.
| Bilinear pairing | 14.193 |
| Exponentiation on | 1.525 |
| point multiplication | 0.940 |
| Bloom filter | 0.165 |
The comparison of computation overhead in the secret key generation of two nodes.
| Yang's | 2 | 1 | 1 | 30.951 |
| Cheng's | 2 | 1 | 3 | 32.831 |
| IBKM | 1 | 0 | 2 | 16.438 |
The comparison of communication overhead in the secret key generation of two nodes.
| Communication overhead (bytes) | 336 | 122 | 88 |