bullet Sensors & Transducers Journal

    (ISSN: 2306-8515, e-ISSN 1726-5479)

   

   About this Journal

   Information for Authors

   Editorial Board

   Editorial Calendar

   Current Issue

   Browse Journal

S&T journal's cover

Submit Press Release

Submit White Paper

25 Top Downloaded Articles (2007-2012)

Search

Contact Us

 

 

 

 

Vol. 212, Issue 5, May 2017, pp. 39-49

 

Bullet

 

Hash Chains Sensornet: A Key Predistribution Scheme for Distributed Sensor Networks
Using Nets and Hash Chains
 

Deepak Kumar DALAI and * Pinaki SARKAR

School of Mathematical Sciences, National Institute of Science Education and Research, Bhubaneswar 752 050, India
* Tel.: +919433531020 E–mail: pinakisark@gmail.com

Received: 24 April 2017 /Accepted: 24 May 2017 /Published: 31 May 2017

Digital Sensors and Sensor Sysstems

 

Abstract: Key management is an essential functionality for a security protocol; particularly for implementations to low cost devices of a distributed sensor networks (DSN)–a prototype of Internet of Things (IoT). Constraints in resources of constituent devices of a low cost IoT (example: sensors of DSN) restricts implementations of computationally heavy public key cryptosystems. This leads to adaptation of the novel key predistribution technique in symmetric key platform to efficiently tackle the key management problem for these resource starved networks. Initial key predistribution schemes (KPS) use random graphs; while later ones exploit combinatorial approaches that assure predictable design properties. Combinatorial designs like a (v, b, r, k)–configuration that forms a µ–CID are effective schemes to design a KPS. A net in a vector space is a set of cosets of certain kind of subspaces called partial spread. A µ(v, b, r, k)–CID can be formed from a net. In this paper, we propose a KPS for DSN, named as Sensornet, using a net. We observe that any deterministic KPS suffer from “smart attack” and hence devise a generic method to eliminate such attacks. Resilience of a KPS can improve by clever application of a Hash Chains technique introduced by Bechkit et al. We improve our Sensornet to obtain a new Hash Chains Sensornet (HC(Sensornet)) by the applications of these two generic methods. Effectiveness of Sensornet and HC(Sensornet) in term of crucial metrics in comparison to prominent schemes has been theoretically established.

 

Keywords: Distributed sensor networks, Key management, Combinatorial designs, Attacks, Hash function.

 

Acrobat reader logo Click <here> or title of paper to download the full pages article in pdf format

 

 

This work is licensed under a Creative Commons 4.0 International License

 

 Creative Commons License
 

 

 

 

 


1999 - 2017 Copyright ©, International Frequency Sensor Association (IFSA) Publishing, S.L. All Rights Reserved.


Home - News - Links - Archives - Tools - Voltage-to-Frequency Converters - Standardization - Patents - Marketplace - Projects - Wish List - e-Shop - Sensor Jobs - Membership - Videos - Publishing - Site Map - Subscribe - Search

 Members Area -Sensors Portal -Training Courses - S&T Digest - For advertisers - Bookstore - Forums - Polls - Submit Press Release - Submit White Paper - Testimonies - Twitter - Facebook - LinkedIn