WO2009071891A1 - Method and apparatus for operating secure sensor networks - Google Patents
Method and apparatus for operating secure sensor networks Download PDFInfo
- Publication number
- WO2009071891A1 WO2009071891A1 PCT/GB2008/004003 GB2008004003W WO2009071891A1 WO 2009071891 A1 WO2009071891 A1 WO 2009071891A1 GB 2008004003 W GB2008004003 W GB 2008004003W WO 2009071891 A1 WO2009071891 A1 WO 2009071891A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- nodes
- sensor
- keys
- key
- node
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 25
- 230000001010 compromised effect Effects 0.000 claims description 7
- 238000004891 communication Methods 0.000 description 13
- 238000013461 design Methods 0.000 description 5
- 230000009466 transformation Effects 0.000 description 4
- 239000011159 matrix material Substances 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 230000007423 decrease Effects 0.000 description 2
- 230000002411 adverse Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000008867 communication pathway Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000003306 harvesting Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 230000002040 relaxant effect Effects 0.000 description 1
- 238000000844 transformation Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Definitions
- This invention relates to methods and apparatus for deploying and operating secure distributed sensor networks.
- Sensor networks typically comprise several low-cost, autonomous, battery-operated nodes, each of which can communicate wirelessly with other nodes within its immediate neighbourhood. They can be used to monitor physical conditions such as temperature, pollution or noise over an extensive area.
- the nodes are distributed in a random fashion, meaning that the network topology is unknown before deployment.
- Each node is usually very limited in memory capacity and processing capabilities.
- the information transmitted by nodes in a sensor network is confidential or is required to be protected from malicious interference. It is therefore desirable in such circumstances to encrypt the wireless communications.
- the probability that two arbitrary nodes share a key in common typically tends to zero as the number of nodes in the system increases; i.e. the ability of nodes to communicate reliably and efficiently worsens as the number of nodes increases.
- the present invention provides a method of deploying a distributed sensor network which comprises a plurality of sensor nodes each communicating wirelessly with nodes which are within wireless range, using key- based encryption with each node being assigned a predetermined number of cryptographic keys from a predetermined set of cryptographic keys, such that a given node may only exchange information directly with another node if the two nodes have a cryptographic key in common, wherein the cryptographic keys have been distributed among the nodes of the sensor network by (i) associating each key in the set of cryptographic keys with a respective key point in a projective space over a finite field; (ii) associating each sensor with a respective rational normal curve in the same projective space; and (iii) for a given sensor, assigning to that sensor the predetermined number of keys, being those keys that are associated with the key points that lie on the rational normal curve associated with that given sensor.
- An advantage of this system is that, as the number of nodes increases, there remains a relatively high probability of any two nodes which are within wireless range of each other having at least one key in common so that they can communicate directly; for example a probability of at least 0.5.
- the probability of any two nodes which are within wireless range of each other having at least one key in common does not drop below 5/8; i.e. 0.625.
- the prior art teaches systems in which the probability is sometimes less than 5/8; in particular, in some prior art arrangements, the probability of any two nodes having at least one key in common tends to zero as the number of nodes increases.
- the probability of any two nodes having at least one key in common is always less than 0.625.
- the probability of any two nodes in wireless range of each other having at least one key in common is always greater than 0.625. Therefore, it is greater than 0.625 in the particular case when k > 1 and b > ((8k/5) -I) 2 .
- the keys are assigned deterministically; for example, by using a combinatorial design to assign keys to each node. This contrasts to a probabilistic approach, in which the keys for each node are picked randomly from a pool of keys.
- keys are not assigned directly to nodes, but instead nodes are assigned secrets which may subsequently be used by a pair of nodes to establish a pair- wise secret key.
- This need for an additional key-establishment step is disadvantageous as it places an additional computational burden on the nodes, which typically have limited processing power and constrained battery life. No such subsequent key- establishment step is required in the present invention, since keys are assigned to nodes directly.
- a distributed sensor network which comprises a number (b) of sensor nodes each communicating wirelessly with nodes which are within wireless range, using key-based encryption with each node being assigned a predetermined number (k) of cryptographic keys from a predetermined set of cryptographic keys, such that a given node may only exchange information directly with another node if the two nodes have a cryptographic key in common, wherein k > 1, b > ((8k/5) -I) 2 and the probability of any two nodes which are within wireless range of each other having at least one key in common is greater than 0.625.
- no single cryptographic key is assigned to all the sensor nodes. Due perhaps to storage constraints in each node, however, the number of keys able to be stored in each node is typically constrained and is typically significantly smaller than the total number of nodes in the network.
- the system affords resiliency against attack such that, if all the keys of an arbitrary node are considered "compromised" (i.e. known to an attacker), the probability that an arbitrary pair of remaining nodes cannot communicate directly as they do not share a non-compromised key in common is relatively low. Preferably in implementations with more than 8 keys per node, this probability does not rise above 0.1 , regardless of the number of nodes in the system. In preferred implementations, the probability tends to 0 as the number of nodes in the system increases.
- a method for determining the respective cryptographic keys to be assigned to a plurality of sensor nodes of a distributed sensor network comprising a plurality of sensor nodes each communicating wirelessly with nodes which are within wireless range, using key- based encryption with each node being assigned a predetermined number of cryptographic keys from a predetermined set of cryptographic keys, such that a given node may only exchange information directly with another node if the two nodes have a cryptographic key in common, wherein the cryptographic keys to be assigned to respective nodes are determined by (i) associating each key in the set of cryptographic keys with a respective key point in a projective space over a finite field; (ii) associating each sensor with a respective rational normal curve in the same projective space; and (iii) for a given sensor, determining the predetermined number of keys that are to be assigned to that sensor, being those keys that are associated with the key points that lie on the rational normal curve associated with that given sensor.
- the probability of any two nodes having at least one key in common preferably decreases monotonically for increasing numbers of nodes in the sensor network.
- the invention provides a method of adding a new sensor to an existing distributed sensor network having a plurality of sensor nodes each being assigned a predetermined number of cryptographic keys from a set of available keys, there being a predetermined association between the keys and points in a projective space over a finite field; the method comprising the steps of: selecting a rational normal curve in said projective space to be associated with the new sensor; loading the new sensor with the predetermined number of keys, each key being respectively associated with a point lying on said rational normal curve in accordance with the predetermined association; and adding the new sensor to the sensor network.
- the selected rational normal curve for the new sensor is not already associated with a sensor of said sensor network.
- the invention provides a method of distributing cryptographic keys among a plurality of sensor nodes, wherein each node receives a predetermined, constant plurality of keys and wherein the probability of an arbitrary pair of nodes having at least one key in common tends to a non-zero limit as the number of nodes increases.
- communication between two nodes of a distributed sensor network comprises the steps of: encrypting data on a first node using a cryptographic key selected from a first set of cryptographic keys stored on the first node; communicating the encrypted data to a second node; and decrypting the data on the second node using the same cryptographic key selected from a second set of cryptographic keys stored on the second node.
- communications between nodes may be classified as confidential or non-confidential and the communication of non-confidential data may be permitted without encryption; in such cases the restriction, according to aspects of the invention, that nodes may only communicate if they share a key in common is to be understood to apply only when confidential data is to be communicated.
- Figure 1 is a schematic view of a sensor node suitable for use with the method of the invention
- Figure 2 is a diagram of a distributed sensor network in accordance with the method of the invention.
- Figure 3 is a table showing some typical parameters for different sensor networks.
- Figure 1 shows a sensor node 2 having a sensor 4 for measuring ambient temperature, pressure, noise, atmospheric pollution, or the like. It also has an antenna 6 and a communications module 8 for two-way wireless communication with neighbouring nodes.
- a battery 10 provides power to the node; however, other power sources such as an external power connection, a solar cell, or energy harvesting from ambient vibrations are all also possible.
- the key store 12 is an area of memory able to hold one or more cryptographic keys. These keys are used by the cryptography engine 14 to encrypt outgoing messages and to decrypt incoming messages.
- the engine 14 is also able to perform key exchange protocols, message hashing, message authentication, random number generation, and other cryptographic operations. It is further able to negotiate which key to use from the key store 12 when initiating secure communication with a neighbouring sensor node.
- Figure 2 shows four sensor nodes 2a, 2b, 2c, 2d substantially as described above in proximity to one another.
- the dashed circles 16a, 16b, 16c, 16d indicate their respective effective wireless ranges.
- the bold lines indicate the possible direct wireless communication pathways between pairs of nodes. While one sensor node 2c is able to communicate directly with any of the other nodes 2a, 2b, 2c, these three other nodes are not all in direct range of each other. In particular, one node 2d has in its range 16d only one other node 2c. If this node 2d is to communicate with either of the two nodes 2a, 2b not in its range 16d, it must relaying the messages through the intermediary node 2c.
- the nodes are arranged to implement a key predistribution scheme consisting of three phases: key predistribution, shared key discovery, and path-key establishment.
- a sensor node is initially loaded with a fixed number of keys. Each key is assigned a unique identifier.
- the shared-key discovery phase takes place, where any two nodes in wireless communication range exchange their list of key identifiers with each other, and look for their common keys. If they share one or more common keys, they can pick one of them as their secret key for cryptographic communication.
- the path-key establishment phase takes place if there is no common key between a pair of nodes. A sequence of nodes is called a path.
- a node i To establish a secure path with node j, a node i needs to find a path between itself and the node j such that any two adjacent nodes (in the radio coverage range) in the path have a common key. Thus messages from the node i can reach the node j securely.
- a "combinatorial design” is a pair of sets (M, E ), where M is a finite set of points and E is a finite set of subsets of M, called blocks.
- Any combinatorial design can be used to establish a key pre-distribution scheme for a distributed sensor network. Assume the sensor network has b sensor nodes N ⁇ , ... , N b . In a such a scheme, the points of Mare mapped to a set of v keys, where each key AT 1 , for 1 ⁇ / ⁇ v, is chosen randomly from some particular key-space. Each E j is assigned to a sensor node N j and is used to specify which keys are given to the node; i.e. the sensor node N j receives the set of A: keys ⁇ K t
- the key predistribution phase of the present embodiment uses combinatorial designs based on the rational normal curves (RNCs) in the projective space PG(n, F ? ), where n denotes the dimension of the space and F ? denotes the finite field with q elements.
- F 9 be the finite field with q elements and n > 2 be a positive integer.
- PG ⁇ n, F 9 be the projective space of dimension n over F 9 .
- a point of PG(n, F 9 ) is denoted by (xo, Xi, ... , X n ) where x, e F 9 , for 0 ⁇ / ⁇ n, are not all zero. If ⁇ is a nonzero element of F 9 , then ( ⁇ x ⁇ , ⁇ xi, ... , ⁇ x n ) and (xo, Jc 1 , ... , X n ) denote the same point of PG(n, F g ).
- T is a non-singular matrix over F q of order n+1, then T generates a one-to-one transformation of points in PG(n, F 9 ) defined by PG(n, F 9 ) ⁇ PG(n, F 9 )
- a curve C in PG(n, F 9 ) to be the image of the map PG(I, F 9 ) ⁇ PG ⁇ n, F 9 ) (X 05 X 1 ) (-> (x o ⁇ ,x o n x,,..., ⁇ ) .
- the projective line PG(I, F 9 ) consists of the following q +1 points: ⁇ (l, ⁇ ) : ⁇ e F, ⁇ u ⁇ (0,l) ⁇ .
- the curve C consists of the following q +1 points:
- Equation (2) It is easy to see that the q +1 points in Equation (2) are all the solutions of the following system of homogeneous equations:
- RNC Random Normal Curve
- m points p, (x l0 , x,i, ... , x ⁇ n ) ⁇ PG(n, F 9 ) (1 ⁇ / ⁇ m) are called "linearly independent” if the rank of the matrix (x ⁇ j ) ⁇ , ⁇ m, o ⁇ / ⁇ n is m -
- RNCs are well known to those skilled in the art:
- n > 2 be an integer and q > n + 2 be a prime power. Then the total number of RNCs in PG(n, F 9 ) is
- N denote all the sets of points in PG(n, F ? ) such that each set consists of at most n + 3 points in which any 1 ⁇ m ⁇ n + 1 points are linearly independent.
- P GJV with ⁇ P ⁇ r there exist ⁇ r rational normal curves passing through all the points of P, where
- the number ⁇ 'c(r) (1 ⁇ r ⁇ n +1) can be caluclated in the order ⁇ 'dn+2), ⁇ 'dn+1), ..., ⁇ 'dl) successively.
- ⁇ d r for 1 ⁇ r ⁇ n +2, to be the number of RNCs that intersect with C at r points, and the number ⁇ c to be the number of RNCs (excluding Q that have a nonempty intersection with C.
- Mc(r) ( q + %c(r) , (5) and
- M be the set of all points in the projective space PG(n, F q ) with dimension n over the finite field F ?
- E be the set of all RNCs in PG(n, F ? ). Then the pair of sets (M, E) is a combinatorial design.
- the key pre-distribution scheme for wireless sensor networks is designed using RNCs.
- the points in M are identified with a set of v keys, where
- each key Ki is randomly chosen from some specified key-space.
- the sensor nodes are denoted N 1 , N 2> ⁇ , Nb, where b is the number of RNCs as given in equation (3).
- E 1 , E 2 , ... , E b denote all the RNCs.
- each node Nj receives the set of keys corresponding to the points in E, .
- each sensor node 2 receives q +1 keys, by the first property of RNCs given above.
- the value of n in the key predistribution scheme is set equal to 2.
- parameter q may not be possible to select parameter q to give a number b of RNCs in PG(I, F g ) precisely equalling the desired number of sensor nodes 2 in the distributed network.
- q is likely to be constrained by the memory capacity of the key store 12 in the sensor nodes 2 (each node receives q +1 keys) and the required cryptographic strength of the system (insofar as this determines the bit-length of the keys).
- a randomly-selected subset of all the RNCs in PG ⁇ 2, F 9 ) is chosen to be used in the scheme, of size equal to the number of sensor nodes.
- the number of keys in common between any two sensor nodes 2 equals the number of points in common between their corresponding two RNCs, which, in the present embodiment, may range between 0 and 4. If two nodes 2a, 2b share one or more keys in common, one of these keys can be used as the secret key in encrypted direct communication between the nodes.
- Each sensor node 2a, 2b, 2c, 2d can communicate with nodes only within its wireless range 16a, 16b, 16c, 16d or "neighbourhood".
- two nodes TV, and Nj (2a, 2b) are in each other's neighbourhoods 16a, 16b.
- the probability that N, and N j share at least one key is
- fail( ⁇ ) denote the probability that an arbitrary link is affected by the compromise of a random node. For any integer n > 2,
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Selective Calling Equipment (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB1011156A GB2467890A (en) | 2007-12-03 | 2008-12-03 | Method and apparatus for operating secure sensor networks |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB0723617.7A GB0723617D0 (en) | 2007-12-03 | 2007-12-03 | Method and apparatus for operating secure sensor networks |
GB0723617.7 | 2007-12-03 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2009071891A1 true WO2009071891A1 (en) | 2009-06-11 |
Family
ID=38962526
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB2008/004003 WO2009071891A1 (en) | 2007-12-03 | 2008-12-03 | Method and apparatus for operating secure sensor networks |
Country Status (2)
Country | Link |
---|---|
GB (2) | GB0723617D0 (en) |
WO (1) | WO2009071891A1 (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006131849A2 (en) * | 2005-06-08 | 2006-12-14 | Koninklijke Philips Electronics N.V. | Deterministic key for pre-distribution for mobile body sensor networks |
EP1835653A1 (en) * | 2005-01-21 | 2007-09-19 | Mitsubishi Electric Corporation | Key storage device, key storage method, and program |
-
2007
- 2007-12-03 GB GBGB0723617.7A patent/GB0723617D0/en not_active Ceased
-
2008
- 2008-12-03 WO PCT/GB2008/004003 patent/WO2009071891A1/en active Application Filing
- 2008-12-03 GB GB1011156A patent/GB2467890A/en not_active Withdrawn
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1835653A1 (en) * | 2005-01-21 | 2007-09-19 | Mitsubishi Electric Corporation | Key storage device, key storage method, and program |
WO2006131849A2 (en) * | 2005-06-08 | 2006-12-14 | Koninklijke Philips Electronics N.V. | Deterministic key for pre-distribution for mobile body sensor networks |
Non-Patent Citations (6)
Title |
---|
CAMTEPE S A ET AL: "Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks", IEEE / ACM TRANSACTIONS ON NETWORKING, IEEE / ACM, NEW YORK, NY, US, vol. 15, no. 2, 1 April 2007 (2007-04-01), pages 346 - 358, XP011184501, ISSN: 1063-6692 * |
DATABASE INSPEC [online] THE INSTITUTION OF ELECTRICAL ENGINEERS, STEVENAGE, GB; 2004, LEE J ET AL: "Deterministic key predistribution schemes for distributed sensor networks", XP002515068, Database accession no. 8470047 * |
J. DONG, D. PEI, Q. ZHAI: "A key predistribution scheme based on rational normal curves over finite fields", ACTA MATHEMATICAE APPLICATAE SINICA, 15 January 2001 (2001-01-15), XP002515065, Retrieved from the Internet <URL:http://166.111.121.20:9080/mathjournal/YYSU200101/yysu200101010.caj.pdf> [retrieved on 20090323] * |
JUNWU DONG ET AL: "A Key Predistribution Scheme Based on 3-Designs", INFORMATION SECURITY AND CRYPTOLOGY; [LECTURE NOTES IN COMPUTER SCIENCE], vol. 4990, September 2007 (2007-09-01), Xining, China, pages 81 - 92, XP019101850, Retrieved from the Internet <URL:http://www.springerlink.com/content/r56n072117261r1p/fulltext.pdf> [retrieved on 20090323] * |
SELECTED AREAS IN CRYPTOGRAPHY. 11TH INTERNATIONAL WORKSHOP, SAC 2004. REVISED SELECTED PAPERS 9-10 AUG. 2004 WATERLOO, ONT., CANADA, 2004, Selected Areas in Cryptography. 11th International Workshop, SAC 2004. Revised Selected Papers (Lecture Notes in Computer Science Vol.3357) Springer-Verlag Berlin, Germany, pages 294 - 307, ISBN: 3-540-24327-5 * |
ZHEN YU ET AL: "A key pre-distribution scheme using deployment knowledge for wireless sensor networks", INFORMATION PROCESSING IN SENSOR NETWORKS, 2005. IPSN 2005. FOURTH INT ERNATIONAL SYMPOSIUM ON LOS ANGELES, CA, USA 25-27 APRIL 2005, PISCATAWAY, NJ, USA,IEEE, 25 April 2005 (2005-04-25), pages 261 - 268, XP010807225, ISBN: 978-0-7803-9201-4 * |
Also Published As
Publication number | Publication date |
---|---|
GB201011156D0 (en) | 2010-08-18 |
GB0723617D0 (en) | 2008-01-09 |
GB2467890A (en) | 2010-08-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liu et al. | Establishing pairwise keys in distributed sensor networks | |
Liu et al. | Improving key predistribution with deployment knowledge in static sensor networks | |
EP1671449B1 (en) | Authenticated key exchange based on pairwise master key | |
Hwang et al. | Energy-memory-security tradeoffs in distributed sensor networks | |
Khan et al. | Matrix-based memory efficient symmetric key generation and pre-distribution scheme for wireless sensor networks | |
US20080044028A1 (en) | Pair-wise key pre-distribution method for wireless sensor network | |
Huang et al. | A forward authentication key management scheme for heterogeneous sensor networks | |
Conti et al. | Privacy‐preserving robust data aggregation in wireless sensor networks | |
Moore | A collusion attack on pairwise key predistribution schemes for distributed sensor networks | |
Bettayeb et al. | A robust and efficient vector-based key management scheme for IoT networks | |
KR100640003B1 (en) | Method for key-distribution in wireless sensor network | |
Guo et al. | A permutation-based multi-polynomial scheme for pairwise key establishment in sensor networks | |
WO2009071891A1 (en) | Method and apparatus for operating secure sensor networks | |
Sadi et al. | GBR: Grid based random key predistribution for wireless sensor network | |
Devi et al. | A new approach for evolution of end to end security in wireless sensor network | |
Kavitha et al. | Updating distributed cache mechanism using Bloom filter for asymmetric cryptography in large wireless networks | |
Sarkar et al. | Key predistribution scheme using finite fields and reed muller codes | |
CN113557706B (en) | Method and system for transmitting data packets, transmitting node and receiving node | |
Rana et al. | A Key Management Scheme for Lightweight Block Cipher in Iot Networks | |
KR100987315B1 (en) | A key distributing system and method for sensor networks using an N dimension cube | |
Zhang | WS03/04 | |
Yoon et al. | A new collision-free pseudonym scheme in mobile ad hoc networks | |
Banaie et al. | A Polynomial-based Pairwise Key Pre-distribution and Node Authentication Protocol for Wireless Sensor Networks | |
Abraham et al. | A Light-Weight Protocol for Data Integrity and Authentication in Wireless Sensor Networks | |
Khan | A key storage and path key efficient diagonal-based grouping for wireless sensor network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 08857186 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 1011156 Country of ref document: GB Kind code of ref document: A Free format text: PCT FILING DATE = 20081203 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1011156.5 Country of ref document: GB |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 08857186 Country of ref document: EP Kind code of ref document: A1 |