GB2467890A - Method and apparatus for operating secure sensor networks - Google Patents

Method and apparatus for operating secure sensor networks Download PDF

Info

Publication number
GB2467890A
GB2467890A GB1011156A GB201011156A GB2467890A GB 2467890 A GB2467890 A GB 2467890A GB 1011156 A GB1011156 A GB 1011156A GB 201011156 A GB201011156 A GB 201011156A GB 2467890 A GB2467890 A GB 2467890A
Authority
GB
United Kingdom
Prior art keywords
keys
sensor
key
nodes
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB1011156A
Other versions
GB201011156D0 (en
Inventor
Chunming Rong
Dingyl Pei
Junwu Dong
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
PREKUBATOR AS
Original Assignee
PREKUBATOR AS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by PREKUBATOR AS filed Critical PREKUBATOR AS
Publication of GB201011156D0 publication Critical patent/GB201011156D0/en
Publication of GB2467890A publication Critical patent/GB2467890A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L29/06721
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • H04L29/08558
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Selective Calling Equipment (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

A method of deploying a distributed sensor network which comprises a plurality of sensor nodes (2a, 2b, 2c, 2d) each communicating wirelessly with nodes (2a, 2b, 2c, 2d) which are within wireless range, using key-based encryption with each node being assigned a predetermined number of keys from a set of cryptographic keys, such that a given node may only exchange information directly with another node if the two have a key in common, wherein the keys have been distributed among the nodes by (i) associating each key in the set of keys with a respective key point in a projective space over a finite field; (ii) associating each sensor with a respective rational normal curve in the same projective space; and (iii) for a given sensor, assigning to that sensor the predetermined number of keys, being those keys that are associated with the key points that lie on the rational normal curve associated with that given sensor.
GB1011156A 2007-12-03 2008-12-03 Method and apparatus for operating secure sensor networks Withdrawn GB2467890A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB0723617.7A GB0723617D0 (en) 2007-12-03 2007-12-03 Method and apparatus for operating secure sensor networks
PCT/GB2008/004003 WO2009071891A1 (en) 2007-12-03 2008-12-03 Method and apparatus for operating secure sensor networks

Publications (2)

Publication Number Publication Date
GB201011156D0 GB201011156D0 (en) 2010-08-18
GB2467890A true GB2467890A (en) 2010-08-18

Family

ID=38962526

Family Applications (2)

Application Number Title Priority Date Filing Date
GBGB0723617.7A Ceased GB0723617D0 (en) 2007-12-03 2007-12-03 Method and apparatus for operating secure sensor networks
GB1011156A Withdrawn GB2467890A (en) 2007-12-03 2008-12-03 Method and apparatus for operating secure sensor networks

Family Applications Before (1)

Application Number Title Priority Date Filing Date
GBGB0723617.7A Ceased GB0723617D0 (en) 2007-12-03 2007-12-03 Method and apparatus for operating secure sensor networks

Country Status (2)

Country Link
GB (2) GB0723617D0 (en)
WO (1) WO2009071891A1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006131849A2 (en) * 2005-06-08 2006-12-14 Koninklijke Philips Electronics N.V. Deterministic key for pre-distribution for mobile body sensor networks
EP1835653A1 (en) * 2005-01-21 2007-09-19 Mitsubishi Electric Corporation Key storage device, key storage method, and program

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1835653A1 (en) * 2005-01-21 2007-09-19 Mitsubishi Electric Corporation Key storage device, key storage method, and program
WO2006131849A2 (en) * 2005-06-08 2006-12-14 Koninklijke Philips Electronics N.V. Deterministic key for pre-distribution for mobile body sensor networks

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
11th International Workshop on Selected Areas in Cryptography, 10 August 2004, pp294-307, "Deterministic key predistribution schemes for distributed sensor networks", Lee J et al., XP002515068, INSPEC Accession number 8470047 *
ACTA Mathematicae Applicatae Sinica, 15 January 2001, "A key predistribution scheme based on rational normal curves over finite fields", J. Dong et al., XP002515065 *
Fourth International Symposium on Information Processing in Sensor Networks, 25 April 2005, pp261-268, "A key predistribution scheme using deployment knowledge for wireless sensor networks", Zhen Yu et al., XP010807225 *
IEEE/ACM Transactions on Networking, vol. 15, no. 2, 1 April 2007, pp346-358, "Combinatorial design of key distribution mechanisms for wireless sensor networks", Camtepe S A et al., XP011184501 *
Information Security and Cryptology, Lecture Notes in Computer Science, vol 4990, September 2007, pp81-92, "A key predistribution scheme based on 3-designs", Junwu Dong et al., XP019101850 *

Also Published As

Publication number Publication date
GB201011156D0 (en) 2010-08-18
GB0723617D0 (en) 2008-01-09
WO2009071891A1 (en) 2009-06-11

Similar Documents

Publication Publication Date Title
GB2581528B (en) A method, a communication network and a node for exchanging a cryptographic key
US9031228B2 (en) Systems and methods for implementing block cipher algorithms on attacker-controlled systems
JP5172944B2 (en) How to aggregate data in a network
JP2013512625A5 (en)
CN101401141B (en) Information processing system and information processing method
JP5637990B2 (en) Method, communication apparatus and system for communicating in network
CN106233660B (en) Encryption processing device, encryption processing method, and program
CN107078905A (en) Technology for carrying out credible equipment registration
GB2453091A (en) Ad-hoc network key management
MX2010001119A (en) Identification and authentication of devices in a network.
CN106797314A (en) Arrange the cryptographic system shared for key
WO2009069971A3 (en) Method and system for secure communication in near field communication network
EP2175680A3 (en) Downlink routing mechanism
WO2006082984A3 (en) Methods and apparatus for providing a message authentication code using a pipeline
CN105009507A (en) Generating a key derived from a cryptographic key using a physically unclonable function
WO2010014314A3 (en) Method and device for distributing public key infrastructure (pki) certificate path data
GB2453059A (en) Method and system for propagating mutual authentication data in wireless communication networks
MX345371B (en) Key sharing network device and configuration thereof.
CN101997681A (en) Authentication method and system for multi-node path and relevant node equipment
JP4938763B2 (en) Method for forming tag in broadcast encryption system
MXPA05012481A (en) Device and method for encrypting and decrypting a block of data.
WO2019215262A3 (en) Method for securing a data exchange in a distributed infrastructure
Zhou et al. A two-layer key establishment scheme for wireless sensor networks
Gharib et al. Secure overlay routing using key pre-distribution: A linear distance optimization approach
US9049181B2 (en) Network key update system, a server, a network key update method and a recording medium

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)