DocumentCode :
2068755
Title :
Monitoring threshold cryptography based wireless sensor networks with projective plane
Author :
Dey, Hemanta ; Datta, Rohit
Author_Institution :
Electr. & Electron. Commun. Dept., Indian Institue of Technol. Kharagpur, Kharagpur, India
fYear :
2012
fDate :
17-19 Dec. 2012
Firstpage :
1
Lastpage :
4
Abstract :
Securing information transaction in a dynamic environment like wireless ad-hoc and sensor networks is a challenging task due to the vulnerability and resource-constraints in wireless domain. In recent days, threshold cryptography gained significant attention for its theoretically proven robustness in securing such self-organized networks with resource-efficient group multicasting technique. However, threshold-cryptography requires node-to-node secret sharing and combining them at later stage, both of which demands significant computational and communicational resources at the nodes. The transitive effect of internal malicious nodes lying about their assigned shares during share-exchange process can make the system run out of resources for high threshold value. Moreover, node-to-node secret sharing suffers the chance of passive eavesdropping. In this paper, we propose a fully-distributed threshold-cryptography based scheme that can overcome the above-mentioned shortcomings of the existing schemes by applying projective-plane based grouping approach where smaller overlapping sub-groups of n unique nodes exchange their shares using multicasting to form the final secret. The communication complexity reduces to O(√n) from O(n2) of existing schemes.
Keywords :
ad hoc networks; communication complexity; cryptography; multicast communication; wireless sensor networks; communication complexity; communicational resources; dynamic environment; information transaction; internal malicious nodes; multicasting; node-to-node secret sharing; projective plane; projective-plane based grouping; resource-constraints; resource-efficient group multicasting technique; self-organized networks; share-exchange process; threshold cryptography based wireless sensor network monitoring; threshold-cryptography based scheme; vulnerability; wireless ad-hoc networks; wireless sensor networks; WSN security; ad-hoc network; key management; secure group communication; securing distributed system; signcryption; threshold cryptography;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computers and Devices for Communication (CODEC), 2012 5th International Conference on
Conference_Location :
Kolkata
Print_ISBN :
978-1-4673-2619-3
Type :
conf
DOI :
10.1109/CODEC.2012.6509229
Filename :
6509229
Link To Document :
بازگشت