An improved hybrid key management scheme for wireless sensor ...

3 downloads 0 Views 303KB Size Report
An improved hybrid Ney management scheme for wireless sensor networNs. PriyanNa Ahlawat. Department of Computer Engineering. National Institute of ...
)RXUWK,QWHUQDWLRQDO&RQIHUHQFHRQ3DUDOOHO'LVWULEXWHGDQG*ULG&RPSXWLQJ 3'*&

$QLPSURYHGK\EULGNH\PDQDJHPHQWVFKHPHIRU ZLUHOHVVVHQVRUQHWZRUNV 3UL\DQND$KODZDW

0D\DQN'DYH

'HSDUWPHQWRI&RPSXWHU(QJLQHHULQJ 1DWLRQDO,QVWLWXWHRI7HFKQRORJ\ .XUXNVKHWUD,QGLD SUL\DQNDDKODZDW#QLWNNUDFLQ

'HSDUWPHQWRI&RPSXWHU(QJLQHHULQJ 1DWLRQDO,QVWLWXWHRI7HFKQRORJ\ .XUXNVKHWUD,QGLD PGDYH#QLWNNUDFLQ   

Abstract— The prevention of node capture attack is an important issue for wireless sensor network (WSN) security. Key management plays a crucial role in providing secure communication among the sensor nodes. The resilience of the key management scheme used by the WSN for secure communication is considered as a performance metric. During a node capture attack, the keying material gets revealed leading to further compromise of other non-compromised nodes/links. The resistance of key management scheme reduces as the number of captured nodes increases degrading security of the network. This paper addresses minimization of node capture and proposes an improved hybrid key management scheme for it. The scheme uses cryptographic hash function to reduce the number of additional compromised links and thus, the resistance against node capture is improved. We have also evaluated our scheme analytically and results obtained show that it gives better resilience against node capture as compared to other existing schemes. Keywords- Wireless sensor networks, node capture attack, hashing, key predistribution, key management scheme.

,

,1752'8&7,21

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

‹,(((

,,

5(/$7(':25.6

1XPHURXV .06V DUH SURSRVHG IRU :61V 7KH HDUOLHVW SUREDELOLVWLFVFKHPHLVJLYHQE\(VFKHQDXHUDQG*OLJRU>@DV EDVLFVFKHPHZKHUHDVXEVHWRINH\VDUHUDQGRPO\SLFNHGE\ WKHNH\GLVWULEXWLRQVHUYHUDQGDVVLJQWRWKHVHQVRUQRGHV7KLV VFKHPH ZRUNV LQ WKUHH VWDJHV QDPHO\ NH\ SUHGLVWULEXWLRQ VKDUHG NH\ GLVFRYHU\ DQG SDWK NH\ HVWDEOLVKPHQW 7KH QRGHV FDQ HVWDEOLVK WKH OLQN NH\ RQO\ LI WKH\ DUH LQ HDFK RWKHU FRPPXQLFDWLRQUDQJHDQGVKDUHDWOHDVWRQHNH\,WZDVIXUWKHU VWUHQJWKHQ E\ q FRPSRVLWH VFKHPH ZKHUH WKH QRGHV VKDUH DW OHDVW q NH\V WR HVWDEOLVK D VHFXUH OLQN>@ 7KLV VFKHPH SHUIRUPV ZHOO LQ VPDOO VFDOH DWWDFNV EXW IDLOV LQ ODUJH VFDOH DWWDFN $ SRO\QRPLDO SRRO EDVHG VFKHPH LV SURSRVHG E\ %OXQGR HW DO >@ ZKHUH QRGHV VWRUH WKH SRO\QRPLDO VKDUHV LQVWHDG RI NH\V ,W ZDV ODWHU PRGLILHG E\ /LQJ HW DO LQ >@ 7KHVH VFKHPHV DUH t FROOLVLRQ UHVLVWDQW ZKLFK PHDQV LI PRUH WKDQt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q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



)RXUWK,QWHUQDWLRQDO&RQIHUHQFHRQ3DUDOOHO'LVWULEXWHGDQG*ULG&RPSXWLQJ 3'*&

QRGHV$DV\PPHWULFNH\SUHGLVWULEXWLRQLVSUHVHQWHGE\.KDQ HW DO>@ $KDVK FKDLQ DSSURDFK LV JLYHQE\ %HFKNLW HW DO >@LQZKLFKNH\VRIWKHQRGHVDUHKDVKHGEDVHGRQWKHQRGH LGHQWLILHUWRLQFUHDVHWKHUHVLVWDQFHRIWKHVFKHPH7KHH[LVWLQJ NH\ GLVWULEXWLRQ VFKHPHV DUH XQDEOH WR PHHW DOO UHTXLUHPHQWV UHODWHG WR VHFXULW\ VWRUDJH FRPSXWDWLRQ DQG FRPPXQLFDWLRQ RI :61V 7KXV D NH\ PDQDJHPHQW VFKHPH LV QHHGHG WKDW VKRXOG EH DEOH WR SURYLGH D WUDGHRII EHWZHHQ WKH GLIIHUHQW UHTXLUHPHQWVRIWKHQHWZRUN ,,,

B. Threat model 7KH %6 LV DVVXPHG WR VHFXUH DQG FDQQRWEH FRPSURPLVHGE\ DQDGYHUVDU\7KH)1VDUHDOVRWDPSHUSURRIDQGWKXVFDQQRW EH FRPSURPLVHG E\ DQ DGYHUVDU\ 2QO\ WKH 01V FDQ EH SK\VLFDOO\ FDSWXUHG E\ DQ DGYHUVDU\ GXULQJ D QRGH FDSWXUH DWWDFN>@ C. Hash function $KDVKIXQFWLRQLVDSSOLHGRQWKHDVVLJQHGNH\V>@,WKDVWZR SURSHUWLHVQDPHO\

7+(352326('6&+(0(

L &ROOXVLRQUHVLVWDQW,WLVKDUGWRILQGWZRGLVWLQFWPHVVDJHV KDYLQJVDPHRXWSXWYDOXH7KHFRQGLWLRQWKDW+ ݇ଵ + ݇ଶ  DOZD\VKROGLQWKHV\VWHPIRUGLIIHUHQWYDOXHVRI݇ଵ DQG݇ଶ 

7KLVVHFWLRQGHWDLOVWKHZRUNLQJRIWKHSURSRVHGVFKHPH7KH V\PEROVDQGWKHLUPHDQLQJDUHOLVWHGLQ7DEOH 

‫ܣ‬௞ 

$XWKHQWLFDWLRQSRRO

LL  3UHLPDJH UHVLVWDQW ,W GHSLFWV WKDW WKH UHVXOW RI WKH KDVK FDQQRWEHUHYHUVHG*LYHQDQ\xZHFDQQRWGHGXFHx'VXFKWKDW x' = H(x).

‫ܥ‬௞ 

&RPPXQLFDWLRQSRRO

ܲ௉ 

3RO\QRPLDOSRRO

D. Key predistribution phase

7DEOH6\PEROVDQGWKHLUPHDQLQJV Symbol

Meaning

‫ܦܫ‬ெே  01

0RELOHQRGH

%6

%DVHVWDWLRQ

7KLV VHFWLRQ GHWDLOV WKH NH\ SUHGLVWULEXWLRQ SKDVH RI WKH SURSRVHG VFKHPH 7KH SURSRVHG VFKHPH XVHV DV\PPHWULF SUHGLVWULEXWLRQ ZKHUH WKH 01V DUH DVVLJQHG IHZHU NH\V DV FRPSDUHGWRWKH)1V>@7KHNH\VRIWKHNH\SRRODUH DJDLQKDVKHGWRFRQFHDOWKHVHFUHWNH\LQJPDWHULDO,WZRUNVDV IROORZV  1) Key pre-distribution phase of the proposed scheme 7KH%6JHQHUDWHVDODUJHNH\SRRO,WGLYLGHVWKHNH\SRROLQWR WZRGLVMRLQWNH\SRROVQDPHO\$XWKHQWLFDWLRQNH\SRRO ‫ܣ‬௞ RI VL]H3DQGFRPPXQLFDWLRQNH\SRRO ‫ܥ‬௞ RIVL]H&DVLQ>@ 7KHNH\SRRO‫ܣ‬௞ LVXVHGIRUJHQHUDWLQJWKHDXWKHQWLFDWLRQNH\V DQG‫ܥ‬௞ LVXVHGIRUFRPPXQLFDWLRQNH\JHQHUDWLRQEHWZHHQ01 DQG)1,WDOVRJHQHUDWHVDELYDULDWHt-GHJUHHSRO\QRPLDOSRRO ܲ௉ RIVL]H3 

,GHQWLILHURIPRELOHQRGH

)1

)L[HGQRGH

m

.H\ULQJRIPRELOHQRGH

n

3RO\QRPLDOULQJRIPRELOHQRGH

‫ܭ‬௘ 

(QFU\SWLRQNH\

‫ܭ‬௖  ‫ܭ‬௣ 

3RO\QRPLDONH\RIPRELOHQRGH

&RPPXQLFDWLRQNH\

݇௣௩ 

1HWZRUNSULYDWHNH\

݇௣௨௕ 

1HWZRUNSXEOLFNH\

L

1XPEHURIWLPHVWKHKDVKIXQFWLRQLV DSSOLHGRQWKHNH\

 A. Network model 7KH QHWZRUN LV FRQVLGHUHG DV KHWHURJHQHRXV LQ QDWXUH FRQVLVWLQJ RI WZR NLQGV RI QRGHV QDPHO\ IL[HG QRGHV )1V  DQGPRELOHQRGHV 01V >@7KHUHLVDEDVHVWDWLRQ %6 WKDW FROOHFWV GDWDIURP WKH VHQVRUQRGHV DQGSURFHVVHV LW )1VDUH FRQVLGHUHG WR EH PRUH SRZHUIXO QRGHV WKDQ 01V LQ WHUPV RI PHPRU\SURFHVVLQJFDSDELOLW\DQGDGGLWLRQDOUDGLRV01VDFW DV HQG GHYLFHV DQG DUH UHVSRQVLEOH IRU FROOHFWLQJ WKH LQIRUPDWLRQ7KHQHWZRUNPRGHOLVJLYHQLQILJ

a) MN keys assignment: 7KH%6UDQGRPO\DVVLJQVWKHm NH\VWRWKH01VIURPDODUJHNH\SRRO‫ܣ‬௞ :KHQLW VHOHFWV WKH VDPH NH\ LGHQWLILHU WR QH[W VHQVRU QRGH WKHQLWDVVLJQVWKHKDVKHGYDOXHRIWKHNH\LQVWHDGRI WKH RULJLQDO NH\ 7KLV LQFUHDVHV WKH UHVLOLHQFH RI WKH SURSRVHG VFKHPH 7KXV ZH KDYH PDQ\ GHULYDWLYH YHUVLRQVRIWKHNH\DVVLJQHGWRWKHGLIIHUHQWQRGHVLQ WKH QHWZRUN 7KH QRGHLG LV DOVR VWRUHG LQ 01 $ QHWZRUN SXEOLF NH\݇௣௨௕ LV DOVR VWRUHG IRU WKH JOREDO FRQQHFWLYLW\,WDOVRVWRUHnSRO\QRPLDOVKDUHVLQ01 DORQJZLWKWKHLULGV 

BS



FN

FN



FN

FN

MN

MN





MN

MN

MN

 

)LJ1HWZRUNPRGHOIRUWKHSURSRVHGVFKHPH



b) FN keys assignment: 7KH%6UDQGRPO\DVVLJQsNH\V IURPNH\SRRO‫ܣ‬௞ WRWKH)1ZLWKWKHLUNH\LGVZKHUH s>> m ,W LV QRWHG WKDW )1 DUH DVVLJQHG WKH RULJLQDO YHUVLRQV RI WKH NH\ 01 LGV DQG DVVRFLDWHG NH\LGV LQIRUPDWLRQRIDOOWKH01VDUHDOVRVWRUHGLQ)17KH %6 DOVR VWRUH SXEOLFSULYDWH NH\ SDLUV WR FRPPXQLFDWH ZLWK RWKHU )1V DQG %6 $ QHWZRUN SULYDWH NH\݇௣௩ IRU JOREDO FRQQHFWLYLW\ 7ZR GLVWLQFW NH\ ULQJV ݇‫ݎ‬ଵ DQG ݇‫ݎ‬ଶ  IURP ‫ܥ‬௞  FRQWDLQLQJ



)RXUWK,QWHUQDWLRQDO&RQIHUHQFHRQ3DUDOOHO'LVWULEXWHGDQG*ULG&RPSXWLQJ 3'*&



ܿ‫݁݀݋‬ଵ DQG ܿ‫݁݀݋‬ଶ IRU JHQHUDWLQJ WKH FRPPXQLFDWLRQ NH\ %6 DVVLJQV s' SRO\QRPLDOV VKDUHV WR LW ZKHUH s'>>>n.

E. Key relative information stored in the nodes 7KHVHQVRUQRGHVVWRUHWKHNH\VDORQJZLWKWKHLULGHQWLILHUV$ SRO\QRPLDO NH\ ULQJ LV DOVR VWRUHG LQ WKH QRGHV DORQJ ZLWK WKHLU LGHQWLILHUV >@  7KH QRGH LGHQWLILHU KDVK IXQFWLRQ DQG WKHLQWHJHUGHQRWLQJWKHQXPEHURIWLPHVWKHNH\VDUHKDVKHG DUHDOVRVWRUHG7KHNH\ULQJRIDQRGHFRQWDLQVDPL[WXUHRI RULJLQDODQGGHULYDWLYHNH\VDVJLYHQEHORZ  ‫ܴܭ‬௜  ^݄ଶ ሺ݇ଵ ሻ݄ଷ ሺ݇ସ ሻ݄௟ ሺ݇௥ ሻ`  ZKHUH‫ܴܭ‬௜ VWDQGVIRUWKHNH\ULQJRIQRGH݊௜  ݄௟ ሺ݇௥ ሻLV WKH GHULYDWLYH YHUVLRQ RI WKH NH\݇௥ ZLWK ,' r ZLWKKDVKHGYDOXH l.  )Establishment of the pair-wise key between MN and FN $IWHU WKH GHSOR\PHQW RI WKH VHQVRU QRGHV LQ WKH QHWZRUN WKH QRGHVLPPHGLDWHO\VWDUWVHVWDEOLVKLQJWKHSDLUZLVHNH\,QWKH LQLWLDOL]DWLRQ SKDVH WKH QRGHV EURDGFDVW WKHLU NH\ UHODWHG LQIRUPDWLRQ WR RWKHU QRGHV 7KH 01 VHOHFWV WKH PRVW DSSURSULDWH)1LQLWVUDGLRFRYHUDJHEDVHGRQVLJQDOVWUHQJWK EDQGZLGWKDQGDYDLODELOLW\>@7KH01VEURDGFDVWWKHLUQRGH LGHQWLILHUDQGWKHlYDOXH7KH)1ILUVWFRPSDUHVWKH1RGHLGWR LWVRZQVWRUHGLGV$IWHUYHULI\LQJWKHDXWKHQWLFLW\RIWKH01 )1FRPSDUHVWKHNH\LGVDQGSRO\QRPLDOVLGVZLWKLWVRZQLGV WKH QRGHV VWDUW WR HVWDEOLVK WKH DXWKHQWLFDWLRQ NH\ )RU WKH VKDUHG NH\ HVWDEOLVKPHQW DWOHDVW RQH NH\LG VKRXOG EH FRPPRQEHWZHHQWKHQHLJKERULQJQRGHV,IWKHUHLVQRPDWFK WKHQRGHVRSWIRUSDWKNH\HVWDEOLVKPHQW7KLVLVH[SODLQHGLQ GHWDLOLQODWHUVHFWLRQV)RUH[DPSOHOHWWKHNH\ULQJRIQRGHu DQG v EH݇௨ ={݄ଶ ሺ݇ଵ ሻǡ ݄ଶ ሺ݇ଽ ሻǡ ݄ଵ ሺ݇ଵଵ ሻሽ DQG݇௩ = {݄ଶ ሺ݇ଶ ሻǡ ଼݄ ሺ଼݇ ሻǡ ݄ଵ ሺ݇ଽ ሻሽ UHVSHFWLYHO\ 7KHQ ݇ଽ EH WKH FRPPRQ NH\ EHWZHHQ QRGH u DQG v LQ WKH QHWZRUN WKH\ ZLOO HVWDEOLVK WKH NH\DVIROORZV kuv

 ݄ଶ ሺ݇ଽ ሻǡkvu

(h( ݄ଵ ሺ݇ଽ ሻ)

 1) Shared key discovery phase 7KHVKDUHGNH\GLVFRYHU\VWDUWVZLWK01DXWKHQWLFDWLRQE\WKH )1$IWHUWKDWWKHFRPPXQLFDWLRQNH\LVJHQHUDWHGE\)1DQG LVVHQWWR01  a) MN authentication phase and generation of encryption key: 7KH DXWKHQWLFDWLRQ SURFHVV VWDUWV ZLWK WKH UHTXHVW PHVVDJH E\ 01 E\ VHQGLQJ LWV LG WR )1 $IWHU UHFHLYLQJ01LG)1PDWFKHVWKHNH\LGVRI01ZLWK LWV RZQ NH\ LGHQWLILHU OLVW WR YHULI\ LWV DXWKHQWLFLW\ DORQJZLWKPDWFKLQJRISRO\QRPLDOVKDUHV,IWKHUHLV QRNH\PDWFKWKHQ)1UHTXHVW%6IRUHQFU\SWLRQNH\ ݇௘ DORQJZLWKNH\LGVXVHGIRUJHQHUDWLQJLW,IWKHUH LVPDWFKRINH\DQGSRO\QRPLDOVKDUHWKHHQFU\SWLRQ

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݊ଶ RWKHUZLVHLWLV2 n .  Algorithm 1: Algorithm to compute the authentication key between FN and MN in the proposed scheme 1. Input ‫ܦܫ‬ெே  ‫ܦܫ‬௉ோሺெேሻ   ‫ܦܫ‬௄ோሺிேሻ  ‫ܦܫ‬ிே  ‫ܦܫ‬௉ோሺிேሻ  ‫ܦܫ‬௄ோሺிேሻ ǡ Hash function, l 2. Output‫ܭ‬௘ሺிேିெேሻ 3. 1RGH MN EURDGFDVWWKHPHVVDJHVWRFN 4. 1RGH01 → hello^‫ܦܫ‬ெே ǡ ݈ } 5. If ‫ܦܫ‬௄ோሺெேሻ  ∩ ‫ܦܫ‬௄ோሺிேሻ ሻ  $VNV WKH %6 IRU WKH‫ܭ‬௘ሺிேିெேሻ DQG VHQGV WR 01 DORQJ ZLWKNH\LGV 6. If ‫ܦܫ‬௄ோሺெேሻ  ∩ ‫ܦܫ‬௄ோሺிேሻ ሻ  If‫ܦܫ‬௉ோሺெேሻ  ∩ ‫ܦܫ‬௉ோሺிேሻ  3URFHHGWRNH\HVWDEOLVKPHQW HOVH*RWRVWHS 7. If ‫ܦܫ‬௄ோሺெேሻ  ∩ ‫ܦܫ‬௄ோሺிேሻ ሻ \ If‫ܦܫ‬௉ோሺெேሻ  ∩ ‫ܦܫ‬௉ோሺிேሻ  3URFHHGWRNH\HVWDEOLVKPHQW HOVH*RWRVWHS 8. end if 9 end if 10 k= hl ሺ݇ଵ __hl ሺ݇ଶ __hl ሺ݇௬  ݇௣ ݂௞ ‫ܦܫ‬ሺெேሻ ǡ ‫ܦܫ‬ሺிேሻ ሻ ‫ܭ‬௘ሺ௠௡ି௙௡ሻ hash N__݇௣  11 end if 12 return ‫ܭ‬௘ሺ௠௡ି௙௡ሻ 

b) Communication key generation phase: 7RJHQHUDWHWKHFRPPXQLFDWLRQNH\EHWZHHQWKH)1 DQG01WKH)1VHOHFWVܿ‫݁݀݋‬ଵ IURPNH\ULQJ݇‫ݎ‬ଵ DQG ܿ‫݁݀݋‬ଶ IURP WKH NH\ ULQJ  ݇‫ݎ‬ଶ DQG JHQHUDWH ݇௖  DV IROORZV  ݇௖ ܿ‫݁݀݋‬ଵ yMODܿ‫݁݀݋‬ଶ  ZKHUHyLVQXPEHUWKHFRPPRQNH\LGV  $IWHU JHQHUDWLQJ WKH FRPPXQLFDWLRQ NH\ LW HQFU\SW WKHFRPPXQLFDWLRQNH\݇௖ XVLQJSUHYLRXVO\JHQHUDWHG HQFU\SWLRQNH\݇௘ DQGVHQGLWWRWKH01$VWKH01 KDV DOUHDG\ FRPSXWHG WKH HQFU\SWLRQ NH\ LW FDQ



)RXUWK,QWHUQDWLRQDO&RQIHUHQFHRQ3DUDOOHO'LVWULEXWHGDQG*ULG&RPSXWLQJ 3'*&



Algorithm 2: Algorithm to compute the communication key between FN and MN in the proposed scheme ͳǤ Input ‫ܭ‬௘ሺிேିெேሻ , ܿ‫݁݀݋‬ଵ ,ܿ‫݁݀݋‬ଶ , y ʹǤ Output‫ܭ‬௖ሺிேିெேሻ ͵Ǥ ݇௖ ܿ‫݁݀݋‬ଵ yMODܿ‫݁݀݋‬ଶ ͶǤ (QFU\SWLWE\ ୣ DQGVHQGWR01 

,9 3(5)250$1&($1$/@ :H GHDO WKH FRPSURPLVHRIWKHHQFU\SWLRQNH\RQO\EHFDXVHWKHFDSWXULQJ RI WKH HQFU\SWLRQ NH\ OHDGV WR FRPSURPLVH RI WKH FRPPXQLFDWLRQNH\,WLVJLYHQDV  ௠ ௫   ܲ௄஼ሺுாீሻ     ሻ  ଶ࡭࢑

  ܴ௣௖  σ௧௝ୀ଴ ‫݌‬ሺ݆ሻ 



ZKHUHp (j)  §¨ x ·¸ § n ·  §  − n · ¸ ¨ j ¸ ¨© P ¸¹ ¨© P ¹ © ¹

7KXV WKH ILQDO SUREDELOLW\ RI NH\ FRPSURPLVH ܲ௄஼ሺிሻ  IURP (TV  DQG  LVDVIROORZV  ܲ௄஼ሺிሻ ܲ௄஼ሺுாீሻ ܴ௣௖      ZKHUHܲ௄஼ሺுாீሻ LV WKH SUREDELOLW\ RI DGGLWLRQDO FRPSURPLVHG OLQNVGXHWRKDVKHG(*VFKHPH ܴ௣௖ LV WKH SUREDELOLW\ RI NH\ FRPSURPLVH GXH WR SRO\QRPLDOSRRONH\GLVWULEXWLRQVFKHPH xLVQXPEHURIFRPSURPLVHGQRGHV ‫ܣ‬௞ LVWKHDXWKHQWLFDWLRQNH\SRRO 3 LVWKHSRO\QRPLDOSRRO  mLVNH\ULQJ nLVWKHSRO\QRPLDOULQJ   9

6,08/$7,21

:H KDYH DQDO\]HG WKH SHUIRUPDQFH RI WKH SURSRVHG VFKHPHV XVLQJ &EDVHGVLPXODWRU VHWXS ,Q WKLV H[SHULPHQW VHWWKH VL]HRIWKHNH\SRROLVWDNHQDVWKHNH\ULQJVL]HRI01 LVDVVXPHGWREHWKHGHJUHHRISRO\QRPLDOVKDUHtHTXDOVWR WKHYDOXHRIWKHSRO\QRPLDOSRROܲԢLVWDNHQIURPWKHVHW ^`7KHQXPEHURIFDSWXUHGQRGHVxDUHWDNHQIURPWKH VHW^` 

Key ring size

HDVLO\ GHFU\SW WKH PHVVDJH VHQW E\ )1 DQG JHW WKH FRPPXQLFDWLRQ NH\ 7KH GHWDLOHG DOJRULWKP RI FRPSXWDWLRQRIWKHFRPPXQLFDWLRQNH\HVWDEOLVKPHQW EHWZHHQ)1DQG01LVJLYHQE\DOJRULWKP 

45 40 35 30 25 20 15 10 5 0

EG scheme Proposed scheme

0.999895

0.9999877

0.999999

Key connectivity )LJ7KHNH\ULQJVL]HUHTXLUHGE\WKHGLIIHUHQWNH\SUHGLVWULEXWLRQVFKHPHV XQGHUDJLYHQNH\FRQQHFWLYLW\DQGNH\SRROVL]H



 7KHILJGHSLFWVWKHVWRUDJHUHTXLUHPHQWVRI(*VFKHPHDQG WKH SURSRVHG VFKHPH 7R PDLQWDLQ WKH VDPH NH\ FRQQHFWLYLW\ OHYHO WKHSURSRVHG VFKHPH UHTXLUHV OHVVHUQXPEHURINH\V LQ 01V 7KLV LV GXH WR DV\PPHWULF NH\ SUHGLVWULEXWLRQ 7KXV VLJQLILFDQW VWRUDJH VDYLQJ LV JDLQHG RQ WKH 01V DORQJ ZLWK LQFUHDVHGYDOXHRIUHVLOLHQFHDJDLQVWQRGHFDSWXUH 

  ௫ି௝







)RXUWK,QWHUQDWLRQDO&RQIHUHQFHRQ3DUDOOHO'LVWULEXWHGDQG*ULG&RPSXWLQJ 3'*&

Additional compromised links

1.2

Effect of variation in key ring size on the probability of key compromise

1

1.5

EG scheme

0.8

Shan scheme

1

0.6

0.5

0.4

Zhang scheme (22)

0.2

Proposed scheme (14)

0 2

Proposed scheme (22)

0



)LJ  7KH H[SHULPHQW UHVXOW IRU WKH IUDFWLRQ RI DGGLWLRQDO FRPSURPLVHG OLQNVRIGLIIHUHQWNH\SUHGLVWULEXWLRQVFKHPHV

 ,Q ILJ  LW LV VKRZQ WKDW WKH SURSRVHG VFKHPH KDV OHDVW QXPEHURIDGGLWLRQDOFRPSURPLVHGOLQNVDVFRPSDUHGWRRWKHU VFKHPHVZKHQQXPEHURIFDSWXUHGQRGHVDUHNHSWVDPH7KLV LVGXHWRWKHKDVKFKDLQDSSURDFKWKDWUHGXFHVWKHSUREDELOLW\ RI NH\ FRPSURPLVH 7KH SURSRVHG VFKHPH DOVR FRPELQHV WKH SRO\QRPLDO VFKHPH DQG SUREDELOLVWLF NH\ PDQDJHPHQW VFKHPHVZKLFKSURYLGHPRUHUHVLVWDQFHDJDLQVWQRGHFDSWXUH ,I ZH LQFUHDVH WKH NH\ SRRO VL]H NHHSLQJ RWKHU SDUDPHWHUV VDPH WKH SUREDELOLW\ RI NH\ FRPSURPLVH GHFUHDVHV 7KH QXPEHU RI FDSWXUHG QRGHV KDV D GLUHFW LQIOXHQFH RQ WKH SUREDELOLW\RINH\FRPSURPLVH/DUJHUQRGHVZLOOUHYHDOODUJHU IUDFWLRQ RI NH\V WR DQ DGYHUVDU\ WKXV ORZHULQJ WKH UHVLOLHQFH RIWKHVFKHPH  1.20E+00 1.00E+00 8.00E-01 Zhang scheme (P' =14)

6.00E-01

5

10

Number of keys in node

100 200 300 400 500 600 700 800 900 1000

Number of captured nodes

Probability of key compromise

Proposed scheme

Zhang scheme (14)



)LJ  7KH HIIHFW RI WKH YDULDWLRQ LQ NH\ ULQJ VL]H RQ WKH SUREDELOLW\ RI NH\ FRPSURPLVHRIWKHSURSRVHGVFKHPH

 7RSORWWKHJUDSKRIILJZHKDYHWDNHQWKHIROORZLQJYDOXHV [ P ^`‫ܣ‬௞  W Q S :KHQWKH QXPEHU RI NH\V VWRUHG LQ WKH QRGH JHW LQFUHDVHG WKH SUREDELOLW\RINH\FRPSURPLVHDOVRLQFUHDVHV/DUJHUNH\ULQJ UHYHDOPRUHLQIRUPDWLRQZKLFKPDNHVWKHDGYHUVDU\WRREWDLQ ODUJHUIUDFWLRQRIWKHNH\SRRO  9,

&21&/86,21

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

Zhang scheme ( P'= 22)

4.00E-01

5()(5(1&(6

Proposed scheme (P' = 14)

2.00E-01

Proposed scheme (P' = 22)

0.00E+00 100

200

300

400

500

600

700

800

Number of compromised nodes

900

1000



)LJ  7KH HIIHFW RI WKH SRO\QRPLDO SRRO VL]H RQ WKH SUREDELOLW\ RI NH\ FRPSURPLVHRIWKHSURSRVHGVFKHPH

 7KHHIIHFWRIWKHYDULDWLRQLQWKHSRO\QRPLDOSRROVL]HRQWKH QXPEHU RI DGGLWLRQDO FRPSURPLVHG OLQNV DQG KHQFH WKH SUREDELOLW\ RI NH\ FRPSURPLVH RI WKH SURSRVHG VFKHPH LV GHSLFWHG E\ ILJ  :H ILQG WKDW WKHUH LV LQYHUVH UHODWLRQVKLS EHWZHHQ SRRO VL]H DQG SUREDELOLW\ RI NH\ FRPSURPLVH ,I ZH LQFUHDVHWKHSRROVL]H3 IURPWRWKHUHLVVKDUSGHFUHDVH LQSUREDELOLW\RINH\FRPSURPLVH 

>@ ,)$N\LOGL]:6X@ - =KDQJ 9 9DUDGKDUDMDQ :LUHOHVV VHQVRU QHWZRUN NH\ PDQDJHPHQW VXUYH\DQGWD[RQRP\J. of Network and Comput. Applicat.YROSS  >@ 0/0HVVDL + 6HED $ VXUYH\ RI NH\ PDQDJHPHQW VFKHPHV LQ PXOWLSKDVH ZLUHOHVV VHQVRU QHWZRUNV Comput. Networks    >@ / (VFKHQDXHU 9 *OLJRU $ NH\PDQDJHPHQW VFKHPH IRU GLVWULEXWHG VHQVRUQHWZRUNV" Proceedings of 9th ACM Conference on Comput. and Commun. SecuritySS± >@ +&KDQ$3HUULJ'6RQJ5DQGRPNH\SUHGLVWULEXWLRQVFKHPHVIRU VHQVRU QHWZRUNV Proceedings of 2003 IEEE Symposium on Security and Privacy&DOLIRUQLD86$SS± >@ &%OXQGR$'6DQWLV$+HU]EHUJ6.XWWHQ89DFFDUR0@ '/LQJ31LQJ:'X*URXSEDVHGNH\SUHGLVWULEXWLRQIRUZLUHOHVV VHQVRUQHWZRUNVACM trans. on sensor networks, TOSNYROSS  >@ ' /LX 3 1LQJ (VWDEOLVKLQJ SDLUZLVH NH\V LQ GLVWULEXWHG VHQVRU QHWZRUNV Proceedings of 10th ACM CCS, :DVKLQJWRQ '& 2FWREHU 



)RXUWK,QWHUQDWLRQDO&RQIHUHQFHRQ3DUDOOHO'LVWULEXWHGDQG*ULG&RPSXWLQJ 3'*& >@ @ @ ; 'X @ %4LX;&KHQ4:X$NH\GHVLJQWRSURORQJWKHOLIHWLPHRIZLUHOHVV VHQVRUQHWZRUNVChaos Solitans and FractelsSS >@ 7+ 6KDQ &0 /LX (QKDQFLQJ WKH NH\ SUHGLVWULEXWLRQ VFKHPH RQ ZLUHOHVV VHQVRU QHWZRUNV Proceedings of IEEE Asia Pacific Services Computing ConferenceSS