3/2/2017 1
S ns r N t rk S curit Sensor Network Security
3/2/2017 Sensor Network Security (Simon S. Lam) 1
S ns r N t Sensor Network Security rk S curit 3/2/2017 Sensor - - PowerPoint PPT Presentation
3/2/2017 S ns r N t Sensor Network Security rk S curit 3/2/2017 Sensor Network Security (Simon S. Lam) 1 1 3/2/2017 R. Blom, An optimal class of symmetric key generation systems, R. Blom, An optimal class of symmetric key generation
3/2/2017 1
3/2/2017 Sensor Network Security (Simon S. Lam) 1
3/2/2017 2
Advances in Cryptology: Proceedings of EUROCRYPT 84, Lecture Notes in Computer Science, Springer-Verlag, 209:335–338, 1985.
Reference on application to sensor networks Wenliang Du, Jing Deng, Yunghsiang S. Han, and Pramod Varshney, ”A Pairwise Key Pre distribution Scheme for Wireless Sensor Networks ” Proceedings of the Key Pre-distribution Scheme for Wireless Sensor Networks, Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington DC, October 2003.
3/2/2017 Sensor Network Security (Simon S. Lam) 2
3/2/2017 3
3/2/2017 Sensor Network Security (Simon S. Lam) 3
3/2/2017 4
3/2/2017 Sensor Network Security (Simon S. Lam) 4
3/2/2017 5
3/2/2017 Sensor Network Security (Simon S. Lam) 5
3/2/2017 6
3/2/2017 Sensor Network Security (Simon S. Lam) 6
3/2/2017 7
Comment: Since i and j share a private key encrypted
3/2/2017 Sensor Network Security (Simon S. Lam) 7
Comment: Since i and j share a private key, encrypted messages between them may be relayed by other nodes
3/2/2017 8
3/2/2017 Sensor Network Security (Simon S. Lam) 8
3/2/2017 9
private public Node i Node j
3/2/2017 Sensor Network Security (Simon S. Lam) 9
3/2/2017 10
i j f
3/2/2017 Sensor Network Security (Simon S. Lam) 10
3/2/2017 11
3/2/2017 Sensor Network Security (Simon S. Lam) 11
3/2/2017 12
3/2/2017 Sensor Network Security (Simon S. Lam) 12