Secret Sharing Scheme and Key Sharing Scheme Suitable for Clustered Sensor Networks

A clustered sensor network collects two or more nodes and makes a cluster from them. Generally a cluster head (CH) has all the encryption keys of the nodes in a cluster and performs encrypted communication. However, this type of network has a problem in that the keys are revealed if the CH is analyzed every time after key sharing. Moreover, when all the nodes are set to CH, another problem arises, which is the need for large storage for holding the keys of all the nodes in a cluster. In this paper, we propose the first key sharing scheme that carries out key sharing with the CH and each node in a cluster and that realizes information theoretical security using a secret sharing scheme, even if the CH is analyzed except for the time of encryption communication. Next, we propose the second key sharing scheme in which additional storage for the CH for saving the keys of all the nodes in a cluster is not needed. In order to realize it, the secret sharing scheme is improved and the security is evaluated. In addition, we present the third key sharing scheme in which none of the keys are revealed at all even if CH or all the child nodes are analyzed.

[1]  Yiying Zhang,et al.  A Secret Sharing-Based Key Management in Hierarchical Wireless Sensor Network , 2013, Int. J. Distributed Sens. Networks.

[2]  Achour Mostéfaoui,et al.  Low-Cost Secret-Sharing in Sensor Networks , 2010, 2010 IEEE 12th International Symposium on High Assurance Systems Engineering.

[3]  Satoshi Takahashi,et al.  Asymmetric secret sharing scheme suitable for cloud systems , 2014, 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC).

[4]  Wendi Heinzelman,et al.  Proceedings of the 33rd Hawaii International Conference on System Sciences- 2000 Energy-Efficient Communication Protocol for Wireless Microsensor Networks , 2022 .

[5]  Toshiaki Tanaka,et al.  On a Fast (k, n)-Threshold Secret Sharing Scheme , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[6]  Ricardo Dahab,et al.  SecLEACH - On the security of clustered sensor networks , 2007, Signal Process..