Authenticated Key Agreement Scheme for Heterogeneous Sensor Networks

In this paper, set theory is introduced to the design of authenticated key agreement scheme for heterogeneous sensor networks, and a scheme based on bilinear dynamic accumulator is proposed. The previous schemes based on classical random graph and others mainly achieve key agreement between nodes, and separate authentication and key agreement. From the perspective of set theory, this work transforms authenticated key agreement into set element relationship certification, and integrates identity authentication and key agreement. It includes identity authentication, key agreement, and broadcast authentication. Sensors verify the identity of each other by exchanging ID and witnesses. Legitimate nodes generate a shared key. Broadcast messages are used to dynamically add/delete nodes, and update witness. Experimental results show that the new scheme not only achieves effective integration of authentication, key agreement and broadcast certification; but also has better security, scalability, and adaptive changes in the network structure. It is suitable for higher node performance and security requirements scenarios.

[1]  Yuan Ting Key Management Scheme Using Time-Based Deployment for Wireless Sensor Networks , 2010 .

[2]  Jan Camenisch,et al.  Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials , 2002, CRYPTO.

[3]  Zhao Jing,et al.  A Selection Method for User Authentication Protocols in Wireless Networks , 2015 .

[4]  Zhong Xiao-ru Dynamic accumulators-based authenticated group key management scheme for heterogeneous wireless sensor network , 2014 .

[5]  Wang Jian,et al.  Key Agreement Protocol for Wireless Sensor Networks Using Self-Certified Public Key System , 2012 .

[6]  E. Baburaj,et al.  Key management schemes in Wireless Sensor Networks: A survey , 2013, 2013 International Conference on Circuits, Power and Computing Technologies (ICCPCT).

[7]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[8]  Kong Fan Dynamic Key Management Scheme for Wireless Sensor Network , 2010 .

[9]  Taekyoung Kwon,et al.  GENDEP: Location-Aware Key Management for General Deployment of Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.

[10]  Lan Nguyen,et al.  Accumulators from Bilinear Pairings and Applications , 2005, CT-RSA.

[11]  Elisa Bertino,et al.  Effective Key Management in Dynamic Wireless Sensor Networks , 2015, IEEE Transactions on Information Forensics and Security.

[12]  S. Sitharama Iyengar,et al.  SSEGR: Secure Single-Copy Energy Efficient Geographical Routing Algorithm in Wireless Sensor Networks , 2014 .

[13]  Yacov Yacobi,et al.  A Note on the Bilinear Diffie-Hellman Assumption , 2002, IACR Cryptol. ePrint Arch..

[14]  Mohamed Eltoweissy,et al.  Dynamic key management in sensor networks , 2006, IEEE Communications Magazine.

[15]  Amir Masoud Rahmani,et al.  A dynamic key management scheme for dynamic wireless sensor networks , 2015, Secur. Commun. Networks.

[16]  Huaxiong Wang,et al.  The Bilinear Pairing-based Accumulator Proposed at CT-RSA'05 is not Collision Resistant , 2006, IACR Cryptol. ePrint Arch..

[17]  Zeng Wei Group Key Management Based on Random Perturbation in Wireless Sensor Networks , 2013 .