Key Predistribution Schemes Using Bent Functions in Distributed Sensor Networks

Key management is an essential functionality for developing secure cryptosystems; particularly for implementations to low cost devices of a Distributed Sensor Networks (DSN)–a prototype of Internet of Things (IoT). Low cost leads to constraints in various resources of constituent devices of a IoT (e.g., sensors of a DSN); thereby restricting implementations of computationally heavy public key cryptosystems. This leads to adaptation of the novel key predistribution trick in symmetric key platform to efficiently tackle the problem of key management for these resource starved networks. After a few initial proposals based on random graphs, most key predistribution schemes (KPS) use deterministic (combinatorial) approaches to assure essential design properties. Combinatorial designs like a \((v,b,r,k)-\)configuration which forms a \(\mu (v,b,r,k)-\)CID are effective schemes to design KPS [20]. In this paper, we use bent Boolean functions to generate four combinatorial designs for the purpose of designing deterministic KPS. Of particular interest are our later (two) schemes that are constructed over Dillon’s bent Boolean function. Effectiveness of our solutions in term of crucial metrics in comparison to prominent schemes has been theoretically established.

[1]  Douglas R. Stinson,et al.  A unified approach to combinatorial key predistribution schemes for sensor networks , 2014, IACR Cryptol. ePrint Arch..

[2]  Bülent Yener,et al.  Key distribution mechanisms for wireless sensor networks : a survey , 2005 .

[3]  T. Cusick,et al.  Bent Boolean functions , 2009 .

[4]  Douglas R. Stinson,et al.  On the Construction of Practical Key Predistribution Schemes for Distributed Sensor Networks Using Combinatorial Designs , 2008, TSEC.

[5]  Claude Carlet,et al.  More PS and H-like bent functions , 2015, IACR Cryptol. ePrint Arch..

[6]  O. S. Rothaus,et al.  On "Bent" Functions , 1976, J. Comb. Theory, Ser. A.

[7]  Aloke Dey,et al.  Key predistribution schemes for distributed sensor networks via block designs , 2013, Des. Codes Cryptogr..

[8]  Kevin J. Henry,et al.  Practical Approaches to Varying Network Size in Combinatorial Key Predistribution Schemes , 2013, Selected Areas in Cryptography.

[9]  B. Clifford Neuman,et al.  Kerberos: An Authentication Service for Open Network Systems , 1988, USENIX Winter.

[10]  B. Bollobás The evolution of random graphs , 1984 .

[11]  Bruno Codenotti,et al.  Spectral Analysis of Boolean Functions as a Graph Eigenvalue Problem , 1999, IEEE Trans. Computers.

[12]  Moti Yung,et al.  Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.

[13]  Sushmita Ruj,et al.  Preferential Attachment Model with Degree Bound and Its Application to Key Predistribution in WSN , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).

[14]  Han-Chieh Chao,et al.  A survey of key distribution in wireless sensor networks , 2014, Secur. Commun. Networks.

[15]  Pantelimon Stanica,et al.  Cryptographic Boolean Functions and Applications , 2009 .

[16]  Sushmita Ruj,et al.  Key Predistribution Schemes Using Codes in Wireless Sensor Networks , 2009, Inscrypt.

[17]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[18]  Baofeng Wu,et al.  PS bent functions constructed from finite pre-quasifield spreads , 2013 .

[19]  Aritra Dhar,et al.  Full Communication in a Wireless Sensor Network by Merging Blocks of a Key Predistribution using Reed Solomon Code , 2011 .

[20]  J. Dillon Elementary Hadamard Difference Sets , 1974 .

[21]  Douglas R. Stinson,et al.  Deterministic Key Predistribution Schemes for Distributed Sensor Networks , 2004, Selected Areas in Cryptography.

[22]  Bülent Yener,et al.  Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, ESORICS.

[23]  Jiang Wu,et al.  Product Construction of Key Distribution Schemes for Sensor Networks , 2004, Selected Areas in Cryptography.

[24]  Douglas R. Stinson,et al.  A combinatorial approach to key predistribution for distributed sensor networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[25]  Peter J. Cameron,et al.  Strongly regular graphs , 2003 .

[26]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.

[27]  Samiran Bag,et al.  100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocks , 2012, ISC.