首页> 外文会议>International Conference on Computational Science and Its Applications >A Secure Communication Scheme for Mobile Wireless Sensor Networks Using Hamming Distance
【24h】

A Secure Communication Scheme for Mobile Wireless Sensor Networks Using Hamming Distance

机译:用于使用汉明距离的移动无线传感器网络的安全通信方案

获取原文

摘要

For the secure transmission of information in the mobile wireless sensor network, the information between two nodes must be encrypted. To this end, nodes must share the common key necessary for encryption. At this time, the encryption algorithm should be symmetric cryptography rather than public-key cryptography in consideration of the process performance of sensor nodes, and the number of secret keys that each node must store and manage must be minimized in view of its memory capacity. In this paper, we propose a method of reducing the number of secret keys in spite of using the symmetric encryption algorithm. In this method, each node must store and manage by assigning a unique ID to it, and by ensuring that only those two nodes whose the Hamming Distance between their IDs is "1" share the same secret key. According to this method, each node needs to store and manage only 1og_2 N symmetric secret keys so that two nodes participating in the mobile wireless sensor network can obtain a common key for secure transmission of information. In this paper, we also propose the protocol and algorithm for obtaining a common key between two nodes using their own secret keys and the secret keys acquired from their neighbor nodes, and evaluate the performance (including node connectivity, network resilience against node capture, memory capacity, and key pool size) of our proposing method.
机译:为了在移动无线传感器网络中的信息传输信息,必须加密两个节点之间的信息。为此,节点必须共享加密所需的公共密钥。此时,考虑到传感器节点的处理性能,加密算法应该是对称密码,而不是公钥加密,以及必须在其存储容量中最小化每个节点必须存储和管理的密钥的数量。在本文中,我们提出了一种减少秘密密钥的数量的方法,尽管使用对称加密算法。在此方法中,每个节点必须通过为其分配唯一ID来存储和管理,并且通过确保只能确保其ID之间的汉明距离为“1”的两个节点共享相同的密钥。根据该方法,每个节点需要仅存储和管理1 og_2 n对称密钥,使得参与移动无线传感器网络的两个节点可以获得用于安全传输的公共密钥。在本文中,我们还提出了使用自己的秘密密钥和从其邻居节点获取的秘密密钥在两个节点之间获取公共密钥的协议和算法,并评估性能(包括节点连接,对节点捕获的网络弹性,内存我们提出方法的容量和关键池大小。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号