Abstract
The security of the Multiple-Key Blom’s (MKB) key agreement scheme is analysed. We considered how the scheme may be broken by a very powerful and well resourced adversary who is able to capture any number of nodes to extract all the sensitive keying material. We showed that by choosing suitable keying parameters, the captured private keys cannot be used directly to break the scheme. Each captured key must first be correctly associated with the public key and master key used to compute it. The chances of finding this private-public-master-key association (PPMka) can be made extremely small and would require the attacker to capture a very large number of nodes, or try an extremely large number of possible solutions. This allows the scheme to be secure for use in large networks, overcoming the limitations in the original Blom’s scheme. We obtained some analytical results and compared them to those from computer simulated attacks on the scheme.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Yang, M.L., Al-Anbuky, A., Liu, W.: A Fast and Efficient Key Agreement Scheme for Wireless Sensor Networks. In: International Conference on Wireless and Mobile Communications, Venice, pp. 231–237 (2012)
Yang, M.L., Al-Anbuky, A., Liu, W.: The Multiple-Key Blom’s Scheme for Key Establishment in Mobile Ad Hoc Sensor Networks. In: The 19th Asia-Pacific Conference on Communications, Bali, Indonesia, pp. 422–427 (2013)
Menezes, A.J., Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography (2001)
Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Blom, R.: Non-Public Key Distribution. In: Advances in Cryptology, Proceedings of Crypto 1982, pp. 231–236 (1983)
Blom, R.: An Optimal Class of Symmetric Key Generation Systems. Linkopping University, Tech. Rep. (1984)
Chen, N., Yao, J.-B., Wen, G.-J.: An Improved Matrix Key Pre-distribution Scheme for Wireless Sensor Networks. In: International Conference on Embedded Software Systems, pp. 40–45 (2008)
Du, W., Han, S.Y., Deng, J., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the Conference on Computer and Communications Security (October 2003)
Yu, C.-M., Lu, C.-S., Kuo, S.-Y.: Noninteractive Pairwise Key Establishment for Sensor Networks. IEEE Transactions on Information Forensics and Security 5(3), 556–569 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 IFIP International Federation for Information Processing
About this paper
Cite this paper
Yang, M.L., Anbuky, A.A., Liu, W. (2014). Security of the Multiple-Key Blom’s Key Agreement Scheme for Sensor Networks. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (eds) ICT Systems Security and Privacy Protection. SEC 2014. IFIP Advances in Information and Communication Technology, vol 428. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55415-5_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-55415-5_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-55414-8
Online ISBN: 978-3-642-55415-5
eBook Packages: Computer ScienceComputer Science (R0)