Secret Sharing Scheme and Key Sharing Scheme Suitable for Clustered Sensor Networks
Shinichi Goto, Keiichi Iwamura, Yuji Suga, Kitahiro Kaneda
2016
Abstract
A clustered sensor network collects two or more nodes and makes a cluster from them. Generally a cluster head (CH) has all the encryption keys of the nodes in a cluster and performs encrypted communication. However, this type of network has a problem in that the keys are revealed if the CH is analyzed every time after key sharing. Moreover, when all the nodes are set to CH, another problem arises, which is the need for large storage for holding the keys of all the nodes in a cluster. In this paper, we propose the first key sharing scheme that carries out key sharing with the CH and each node in a cluster and that realizes information theoretical security using a secret sharing scheme, even if the CH is analyzed except for the time of encryption communication. Next, we propose the second key sharing scheme in which additional storage for the CH for saving the keys of all the nodes in a cluster is not needed. In order to realize it, the secret sharing scheme is improved and the security is evaluated. In addition, we present the third key sharing scheme in which none of the keys are revealed at all even if CH or all the child nodes are analyzed.
References
- Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H., 2000. Energy-Efficient Communication Protocol for Wireless Microsensor Networks, Proceedings of the 33rd Hawaii International Conference on System Sciences, January 4-7.
- Oliveira, L.B., Ferreira, A., Vilaça, M.A., Wong, H.C., Bern, M., Dahab, R., Loureiro, A.A., 2007. SecLEACH-On the Security of Clustered Sensor Networks, Signal Processing. Vol. 87, No. 12, pp. 2882-2895.
- Qiang, T., Bingwen, W., Zhicheng, D., 2009. MS-LEACH: A Routing Protocol Combining Multi-hop Transmissions and Single-hop Transmissions, PacificAsia Conference on Circuits, Communications and Systems, pp. 107-110.
- Bertier, M., Mostefaoui, A., Tédan, G., 2010. Low-Cost Secret Sharing in Sensor Networks, Proceedings of the IEEE 12th International Symposium on High Assurance Systems Engineering (HASE'10), pp. 1-9, November.
- Yiying, Z., Chunying, W., Jinping, C., Xiangzhen, L., 2013. A Secret Sharing-Based Key Management in Hierarchical Wireless Sensor Network, International Journal of Distributed Sensor Networks Volume 2013.
- Kurihara, J., Kiyomoto, S., Fukushima, K., Tanaka, T., 2008. On a Fast (k,n)-Threshold Secret Sharing Scheme, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E91-A, No. 9, pp. 2365-2378, Sep.
- Takahashi, S., Kang, H., Iwamura, K, 2014. Asymmetric Secret Sharing Scheme Suitable for Cloud Systems, 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC), pp. 798-804,Las Vegas, Jan.
Paper Citation
in Harvard Style
Goto S., Iwamura K., Suga Y. and Kaneda K. (2016). Secret Sharing Scheme and Key Sharing Scheme Suitable for Clustered Sensor Networks . In Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 6: WINSYS, (ICETE 2016) ISBN 978-989-758-196-0, pages 172-180. DOI: 10.5220/0005999601720180
in Bibtex Style
@conference{winsys16,
author={Shinichi Goto and Keiichi Iwamura and Yuji Suga and Kitahiro Kaneda},
title={Secret Sharing Scheme and Key Sharing Scheme Suitable for Clustered Sensor Networks},
booktitle={Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 6: WINSYS, (ICETE 2016)},
year={2016},
pages={172-180},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005999601720180},
isbn={978-989-758-196-0},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 13th International Joint Conference on e-Business and Telecommunications - Volume 6: WINSYS, (ICETE 2016)
TI - Secret Sharing Scheme and Key Sharing Scheme Suitable for Clustered Sensor Networks
SN - 978-989-758-196-0
AU - Goto S.
AU - Iwamura K.
AU - Suga Y.
AU - Kaneda K.
PY - 2016
SP - 172
EP - 180
DO - 10.5220/0005999601720180