Affiliation:
1. School of Mathematical Sciences, Universiti Sains Malaysia, George Town 11800, Malaysia
Abstract
One of the challenges in securing wireless sensor networks (WSNs) is the key distribution; that is, a single shared key must first be known to a pair of communicating nodes before they can proceed with the secure encryption and decryption of the data. In 1984, Blom proposed a scheme called the symmetric key generation system as one method to solve this problem. Blom’s scheme has proven to be λ-secure, which means that a coalition of λ+1 nodes can break the scheme. In 2021, a novel and intriguing scheme based on Blom’s scheme was proposed. In this scheme, elliptic curves over a finite field are implemented in Blom’s scheme for the case when λ=1. However, the security of this scheme was not discussed. In this paper, we point out a mistake in the algorithm of this novel scheme and propose a way to fix it. The new fixed scheme is shown to be applicable for arbitrary λ. The security of the proposed scheme is also discussed. It is proven that the proposed scheme is also λ-secure with a certain condition. In addition, we also discuss the application of this proposed scheme in distributed ledger technology (DLT).
Funder
Universiti Sains Malaysia under the short-term grant 391 scheme
Subject
Control and Optimization,Computer Networks and Communications,Instrumentation
Reference28 articles.
1. Dargie, W., and Poellabauer, C. (2010). Fundamentals of Wireless Sensor Networks: Theory and Practice, John Wiley & Sons Ltd.. [1st ed.].
2. Gaubatz, G., Kaps, J.-P., and Sunar, B. (2004, January 6). Public key cryptography in sensor networks–revisited. Proceedings of the Security in Ad-hoc and Sensor Networks, Heidelberg, Germany.
3. A method for obtaining digital signatures and public–key cryptosystems;Rivest;Commun. ACM,1983
4. Use of Elliptic Curves in Cryptography;Williams;Proceedings of the Advances in Cryptology—CRYPTO ’85,1985
5. Key distribution and management in wsn security: A state of the art;Ahlawat;Int. Innov. Technol. Explor. Eng. (IJITEE),2019
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献