دانلود مقاله ISI انگلیسی شماره 67476
ترجمه فارسی عنوان مقاله

طرح مدیریت کلید خود-ترمیم مبتنی بر چند جمله ای دسترسی اصلاح شده با احراز هویت پخش و مقاومت در برابر تبانی افزایش یافته در شبکه های حسگر بی سیم

عنوان انگلیسی
Modified access polynomial based self-healing key management schemes with broadcast authentication and enhanced collusion resistance in wireless sensor networks
کد مقاله سال انتشار تعداد صفحات مقاله انگلیسی
67476 2016 13 صفحه PDF
منبع

Publisher : Elsevier - Science Direct (الزویر - ساینس دایرکت)

Journal : Ad Hoc Networks, Volume 37, Part 2, February 2016, Pages 324–336

ترجمه کلمات کلیدی
شبکه های حسگر بی سیم؛ مدیریت کلید خود ترمیم؛ چند جمله ای دسترسی؛ پنجره کشویی؛ احراز هویت پخش؛ مقاومت تبانی
کلمات کلیدی انگلیسی
Wireless sensor networks; Self-healing key management; Access polynomial; Sliding window; Broadcast authentication; Collusion resistance
پیش نمایش مقاله
پیش نمایش مقاله  طرح مدیریت کلید خود-ترمیم مبتنی بر چند جمله ای دسترسی اصلاح شده با احراز هویت پخش و مقاومت در برابر تبانی افزایش یافته در شبکه های حسگر بی سیم

چکیده انگلیسی

Though lots of research results about self-healing key management under unreliable links have been proposed, there are still some shortcomings, such as the inefficiency of broadcasts, lack of broadcast authentication, limited sessions for key issues, disastrous risks of access polynomials, and the vulnerability of collusion attacks. In this paper, we propose two modified access polynomial based self-healing key management schemes with broadcast authentication and enhanced collusion resistance. First, two kinds of attacks are introduced to break the security of access polynomials. Then, a modified security model is given, and collusion resistance capability is redefined from the perspective of session interval from node revocation to node addition, which does not depend on the number of collusive nodes. Next, based on sliding window and modified access polynomial, Sch-I and Sch-II are proposed to achieve the security and tolerate packet losses, which allow pairwise keys between member nodes and group manager to be updated dynamically. Finally, theoretical analysis validates that the proposed schemes have δ self-healing capability, any-wise forward security and backward security, and enhanced collusion resistance capability, and can also avoid the flaws of access polynomials and reduce the resource consumption. Compared with existing schemes, they are quite suitable for practical applications.