Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: IResearch Article Broadcast Secrecy via Key-Chain-Based Encryption in Single-Hop Wireless Sensor Networks | Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 2011 Article ID 695171 12 pages doi 10.1155 2011 695171 Research Article Broadcast Secrecy via Key-Chain-Based Encryption in Single-Hop Wireless Sensor Networks Vijay Sivaraman 1 2 Diethelm Ostry 2 Jaleel Shaheen 1 2 Antoni Junior Hianto 1 and Sanjay Jha1 2 1 University of New South Wales Sydney NSW2052 Australia 2ICT Centre CSIRO Sydney Australia Correspondence should be addressed to Vijay Sivaraman vijay@unsw.edu.au Received 28 May 2010 Accepted 27 August 2010 Academic Editor Damien Sauveron Copyright 2011 Vijay Sivaraman et al. This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use distribution and reproduction in any medium provided the original work is properly cited. Broadcast is used in wireless sensor networks for operations such as software updates network queries and command dissemination. Applications such as battlefield control and natural resource management require not only authentication of broadcast messages but also secrecy against eavesdroppers. In this paper we design implement and evaluate a novel scheme that meets the requirements of secrecy authenticity integrity and freshness of broadcast messages in the context of a single-hop wireless sensor network. Our contributions are three-fold first we propose the use of time-varying keys based on a key-chain for broadcast encryption emphasising advantages such as non-forgeability protection against old-key compromise and allowance for dynamic data. Second we extend the basic key-chain mechanism to incorporate limited protection against key loss allowing legitimate receivers to recover even if they have lost a small number of keys. Third we prototype our scheme by incorporating it into Deluge the network programming protocol distributed with TinyOS and quantify its cost in terms of time space and power consumption on a TelosB mote platform. .