GB2467890A - Method and apparatus for operating secure sensor networks - Google Patents
Method and apparatus for operating secure sensor networks Download PDFInfo
- Publication number
- GB2467890A GB2467890A GB1011156A GB201011156A GB2467890A GB 2467890 A GB2467890 A GB 2467890A GB 1011156 A GB1011156 A GB 1011156A GB 201011156 A GB201011156 A GB 201011156A GB 2467890 A GB2467890 A GB 2467890A
- Authority
- GB
- United Kingdom
- Prior art keywords
- keys
- sensor
- key
- nodes
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H04L29/06721—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H04L29/08558—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Selective Calling Equipment (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A method of deploying a distributed sensor network which comprises a plurality of sensor nodes (2a, 2b, 2c, 2d) each communicating wirelessly with nodes (2a, 2b, 2c, 2d) which are within wireless range, using key-based encryption with each node being assigned a predetermined number of keys from a set of cryptographic keys, such that a given node may only exchange information directly with another node if the two have a key in common, wherein the keys have been distributed among the nodes by (i) associating each key in the set of keys with a respective key point in a projective space over a finite field; (ii) associating each sensor with a respective rational normal curve in the same projective space; and (iii) for a given sensor, assigning to that sensor the predetermined number of keys, being those keys that are associated with the key points that lie on the rational normal curve associated with that given sensor.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB0723617.7A GB0723617D0 (en) | 2007-12-03 | 2007-12-03 | Method and apparatus for operating secure sensor networks |
PCT/GB2008/004003 WO2009071891A1 (en) | 2007-12-03 | 2008-12-03 | Method and apparatus for operating secure sensor networks |
Publications (2)
Publication Number | Publication Date |
---|---|
GB201011156D0 GB201011156D0 (en) | 2010-08-18 |
GB2467890A true GB2467890A (en) | 2010-08-18 |
Family
ID=38962526
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GBGB0723617.7A Ceased GB0723617D0 (en) | 2007-12-03 | 2007-12-03 | Method and apparatus for operating secure sensor networks |
GB1011156A Withdrawn GB2467890A (en) | 2007-12-03 | 2008-12-03 | Method and apparatus for operating secure sensor networks |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GBGB0723617.7A Ceased GB0723617D0 (en) | 2007-12-03 | 2007-12-03 | Method and apparatus for operating secure sensor networks |
Country Status (2)
Country | Link |
---|---|
GB (2) | GB0723617D0 (en) |
WO (1) | WO2009071891A1 (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006131849A2 (en) * | 2005-06-08 | 2006-12-14 | Koninklijke Philips Electronics N.V. | Deterministic key for pre-distribution for mobile body sensor networks |
EP1835653A1 (en) * | 2005-01-21 | 2007-09-19 | Mitsubishi Electric Corporation | Key storage device, key storage method, and program |
-
2007
- 2007-12-03 GB GBGB0723617.7A patent/GB0723617D0/en not_active Ceased
-
2008
- 2008-12-03 WO PCT/GB2008/004003 patent/WO2009071891A1/en active Application Filing
- 2008-12-03 GB GB1011156A patent/GB2467890A/en not_active Withdrawn
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1835653A1 (en) * | 2005-01-21 | 2007-09-19 | Mitsubishi Electric Corporation | Key storage device, key storage method, and program |
WO2006131849A2 (en) * | 2005-06-08 | 2006-12-14 | Koninklijke Philips Electronics N.V. | Deterministic key for pre-distribution for mobile body sensor networks |
Non-Patent Citations (5)
Title |
---|
11th International Workshop on Selected Areas in Cryptography, 10 August 2004, pp294-307, "Deterministic key predistribution schemes for distributed sensor networks", Lee J et al., XP002515068, INSPEC Accession number 8470047 * |
ACTA Mathematicae Applicatae Sinica, 15 January 2001, "A key predistribution scheme based on rational normal curves over finite fields", J. Dong et al., XP002515065 * |
Fourth International Symposium on Information Processing in Sensor Networks, 25 April 2005, pp261-268, "A key predistribution scheme using deployment knowledge for wireless sensor networks", Zhen Yu et al., XP010807225 * |
IEEE/ACM Transactions on Networking, vol. 15, no. 2, 1 April 2007, pp346-358, "Combinatorial design of key distribution mechanisms for wireless sensor networks", Camtepe S A et al., XP011184501 * |
Information Security and Cryptology, Lecture Notes in Computer Science, vol 4990, September 2007, pp81-92, "A key predistribution scheme based on 3-designs", Junwu Dong et al., XP019101850 * |
Also Published As
Publication number | Publication date |
---|---|
GB201011156D0 (en) | 2010-08-18 |
GB0723617D0 (en) | 2008-01-09 |
WO2009071891A1 (en) | 2009-06-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2581528B (en) | A method, a communication network and a node for exchanging a cryptographic key | |
US9031228B2 (en) | Systems and methods for implementing block cipher algorithms on attacker-controlled systems | |
JP5172944B2 (en) | How to aggregate data in a network | |
JP2013512625A5 (en) | ||
CN101401141B (en) | Information processing system and information processing method | |
JP5637990B2 (en) | Method, communication apparatus and system for communicating in network | |
CN106233660B (en) | Encryption processing device, encryption processing method, and program | |
CN107078905A (en) | Technology for carrying out credible equipment registration | |
GB2453091A (en) | Ad-hoc network key management | |
MX2010001119A (en) | Identification and authentication of devices in a network. | |
CN106797314A (en) | Arrange the cryptographic system shared for key | |
WO2009069971A3 (en) | Method and system for secure communication in near field communication network | |
EP2175680A3 (en) | Downlink routing mechanism | |
WO2006082984A3 (en) | Methods and apparatus for providing a message authentication code using a pipeline | |
CN105009507A (en) | Generating a key derived from a cryptographic key using a physically unclonable function | |
WO2010014314A3 (en) | Method and device for distributing public key infrastructure (pki) certificate path data | |
GB2453059A (en) | Method and system for propagating mutual authentication data in wireless communication networks | |
MX345371B (en) | Key sharing network device and configuration thereof. | |
CN101997681A (en) | Authentication method and system for multi-node path and relevant node equipment | |
JP4938763B2 (en) | Method for forming tag in broadcast encryption system | |
MXPA05012481A (en) | Device and method for encrypting and decrypting a block of data. | |
WO2019215262A3 (en) | Method for securing a data exchange in a distributed infrastructure | |
Zhou et al. | A two-layer key establishment scheme for wireless sensor networks | |
Gharib et al. | Secure overlay routing using key pre-distribution: A linear distance optimization approach | |
US9049181B2 (en) | Network key update system, a server, a network key update method and a recording medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |