Source: KSII Transactions On Internet And Information Systems Vol. 3, No. 2, April 2009 Authors: Abedelaziz Mohaisen, DaeHun Nyang, YoungJae Maeng, KyungHee.

Slides:



Advertisements
Similar presentations
Shahzad Basiri Imam Hossein university Workshop on key distribution Tuesday, May 24, 2011 Linear Key Predistribution Scheme.
Advertisements

RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks Chien-Ming Chen, Yue-Hsun Lin, Ya-Ching Lin, Hung-Ming Sun.
Further improvement on the modified authenticated key agreement scheme Authors: N.Y. Lee and M.F. Lee Source: Applied Mathematics and Computation, Vol.157,
多媒體網路安全實驗室 Improved Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Date : Reporter : Hong Ji Wei Authors.
An Efficient Scheme for Authenticating Public Keys in Sensor Networks Wenliang (Kevin) Du (Syracuse) Ronghua Wang (Syracuse) Peng Ning (North Carolina.
1 Reversible image hiding scheme using predictive coding and histogram shifting Source: Signal Processing, vol. 89, no. 6, June 2009, pp Author:
Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7. Wireless Sensor Network Security.
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir.
1 Security in Wireless Sensor Networks Group Meeting Fall 2004 Presented by Edith Ngai.
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Presenter: Todd Fielder.
T H E O H I O S T A T E U N I V E R S I T Y Computer Science and Engineering 1 Wenjun Gu, Xiaole Bai, Sriram Chellappan and Dong Xuan Presented by Wenjun.
25 April Securing Wireless Sensor Networks Cheyenne Hollow Horn SFS Presentation 2005.
Certificateless Threshold Ring Signature Source: Information Sciences 179(2009) Author: Shuang Chang, Duncan S. Wong, Yi Mu, Zhenfeng Zhang Presenter:
A more efficient and secure dynamic ID- based remote user authentication scheme Yan-yan Wang, Jia-yong Liu, Feng-xia Xiao, Jing Dan in Computer Communications.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang.
Establishing Pairwise Keys in Distributed Sensor Networks Donggang Liu, Peng Ning Jason Buckingham CSCI 7143: Secure Sensor Networks October 12, 2004.
Computer Science 1 Research on Sensor Network Security Peng Ning Cyber Defense Laboratory Department of Computer Science NC State University 2005 TRES.
An Enhanced Two-factor User Authentication Scheme in Wireless Sensor Networks DAOJING HE, YI GAO, SAMMY CHAN, CHUN CHEN, JIAJUN BU Ad Hoc & Sensor Wireless.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
A scalable key pre-distribution mechanism for large-scale wireless sensor networks Author: A. N. Shen, S. Guo, H. Y. Chien and M. Y. Guo Source: Concurrency.
KAIS T Decentralized key generation scheme for cellular-based heterogeneous wireless ad hoc networks 임 형 인 Ananya Gupta, Anindo Mukherjee, Bin.
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Group Rekeying for Filtering False Data in Sensor Networks: A Predistribution and Local Collaboration-Based Approach Wensheng Zhang and Guohong Cao.
PR SM A Secure Code Deployment Scheme for Active Networks Amdjed Mokhtari Leïla Kloul 22 November 2005.
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
Cryptanalysis and Improvement of an Access Control in User Hierarchy Based on Elliptic Curve Cryptosystem Reporter : Tzer-Long Chen Information Sciences.
1 Reversible data hiding for high quality images using modification of prediction errors Source: The Journal of Systems and Software, In Press, Corrected.
A Highly Scalable Key Pre- Distribution Scheme for Wireless Sensor Networks.
A Secure Identification and Key Agreement Protocol with User Anonymity (SIKA) Authors: Kumar Mangipudi and Rajendra Katti Source: Computers & Security,
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks Yun Zhou, Student Member, IEEE, Yuguang Fang, Senior Member, IEEE IEEE TRANSACTIONS ON.
/ 22 1 A Distributed and Efficient Flooding Scheme Using 1-hop Information in Mobile Ad Hoc Networks Hai Liu Xiaohua Jia Peng-Jun Wan Dept. of Comput.
Reversible image hiding scheme using predictive coding and histogram shifting Source: Authors: Reporter: Date: Signal Processing, Vol.89, Issue 6, pp ,
SPEAKER: HONG-JI WEI DATE: Secure Anonymous Authentication Scheme with Roaming for Mobile Networks.
1 Adaptive key pre-distribution model for distributed sensor networks Author: C.-S. Laih, M.-K. Sun, C.-C. Chang and Y.-S. Han Source: IET Communications,
Date: 2012/08/21 Source: Zhong Zeng, Zhifeng Bao, Tok Wang Ling, Mong Li Lee (KEYS’12) Speaker: Er-Gang Liu Advisor: Dr. Jia-ling Koh 1.
Author: Hangyang Dai and Hongbing Xu
Nour KADI, Khaldoun Al AGHA 21 st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications 1.
Key Establishment Scheme against Storage-Bounded Adversaries in Wireless Sensor Networks Authors: Shi-Chun Tsai, Wen-Guey Tzeng, and Kun-Yi Zhou Source:
A secure and scalable rekeying mechanism for hierarchical wireless sensor networks Authors: Song Guo, A-Ni Shen, and Minyi Guo Source: IEICE Transactions.
Key Pre-distribution Approach in Wireless Sensor Networks Using LU Matrix Authors: Hangyang Dai and Hongbing Xu Source: IEEE Sensor Journal, vol.10, no.8,
Localized Low-Power Topology Control Algorithms in IEEE based Sensor Networks Jian Ma *, Min Gao *, Qian Zhang +, L. M. Ni *, and Wenwu Zhu +
RSA-based password authenticated key exchange protocol Presenter: Jung-wen Lo( 駱榮問 )
Secure untraceable off-line electronic cash system Sharif University of Technology Scientia Iranica Volume 20, Issue 3, Pp. 637–646, June 2013 Baseri,
A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge Wenliang Du et al.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
Doc.: IEEE /0070r2 SubmissionSlide 1 Efficient Error Control Using Network Coding for Multicast Transmission Date: Authors: DooJung.
Secure Single Packet IP Traceback Mechanism to Identify the Source Zeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad She, Rashid Mehmood Center.
1 Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems Source: IEEE Transactions on Information Forensics and Security, Vol. 3,
Lightweight Mutual Authentication for IoT and Its Applications
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy Source: Computer & Security,
A lightweight authentication scheme based on self-updating strategy for space information network Source: International Journal Of Satellite Communications.
A flexible date-attachment scheme on e-cash
Key agreement in wireless sensor network
Image camouflage by reversible image transformation
Picode: A New Picture-Embedding 2D Barcode
Reversible data hiding with contrast enhancement using adaptive histogram shifting and pixel value ordering Source: Signal Processing: Image Communication.
Source :Journal of visual Communication and Image Representation
A Secure and Efficient Cloud Resource Allocation Scheme with Trust
Improved Visual Secret Sharing Scheme for QR Code Applications
Hefei Electronic Engineering Institute, Hefei , China
Source: Ad Hoc Networks, Vol. 71, pp , 2018
A Novel Latin Square-based Secret Sharing for M2M Communications
An efficient biometric based remote user authentication scheme for secure internet of things environment Source: Journal of Intelligent & Fuzzy Systems.
An efficient reversible image authentication method using improved PVO and LSB substitution techniques Source : Signal Processing: Image Communication,
Source: Energies, Vol. 10, No. 12, November 2017
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Biometrics-based RSA Cryptosystem for Securing Real-Time Communication
An Efficient Spatial Prediction-Based Image Compression Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
Presentation transcript:

Source: KSII Transactions On Internet And Information Systems Vol. 3, No. 2, April 2009 Authors: Abedelaziz Mohaisen, DaeHun Nyang, YoungJae Maeng, KyungHee Lee, Dowon Hong Presenter: Hsing-Lei Wang Date: 2010/11/26 1

Outline Introduction Related Works The Proposed Scheme Grid-Based Key Pre-Distribution in WSN (3D) Analysis Conclusions Comment 2

Introduction 3 A Grid-Based Key Pre-Distribution Scheme (3D)  Goal: Improve the connectivity and resiliency

Related Works (Blundo et al. scheme, 1993) 4 Polynomial-Based Key Pre-Distribution Scheme

Grid-Based Key Pre-Distribution Scheme (1/2) Related Works (Liu et al. scheme, 2003) 5

6 Grid-Based Key Pre-Distribution Scheme (2/2) Related Works (Liu et al. scheme, 2003)

The Proposed Scheme 7 3D Grid-Based Key Pre-Distribution Scheme (1/11)

8 The Proposed Scheme 3D Grid-Based Key Pre-Distribution Scheme (2/11)

9 The Proposed Scheme 3D Grid-Based Key Pre-Distribution Scheme (3/11)

10 The Proposed Scheme 3D Grid-Based Key Pre-Distribution Scheme (4/11)

11 The Proposed Scheme 3D Grid-Based Key Pre-Distribution Scheme (5/11)

12 The Proposed Scheme 3D Grid-Based Key Pre-Distribution Scheme (6/11)

13 The Proposed Scheme 3D Grid-Based Key Pre-Distribution Scheme (7/11)

14 The Proposed Scheme 3D Grid-Based Key Pre-Distribution Scheme (8/11)

15 The Proposed Scheme 3D Grid-Based Key Pre-Distribution Scheme (9/11)

16 The Proposed Scheme 3D Grid-Based Key Pre-Distribution Scheme (10/11)

17 The Proposed Scheme 3D Grid-Based Key Pre-Distribution Scheme (11/11)

Analysis Connectivity 18

Analysis Resiliency 19

Comparison 20

Conclusions Original contribution: Introduce a grid-based key pre-distribution scheme that utilizes the notion of plats on grid Plat-based polynomial assignment The advantages of the proposed scheme Guarantees higher connectivity More possible intermediate nodes, better resiliency 21

Comment In the Key Establishment phase, the authors do not describe how the sensor node find the intermediate node for indirect key establishment. 22