Security plays a vital role in Wireless Personal Area Network where the data has to be transmitted in free space. The security of the data depends upon the key used for encryption/decryption. Also a secret key has to be shared among the nodes to establish a secure link. The secret key should be resilient to attacks. Key distribution among the nodes in Wireless Personal Area Network is a challenging task. To guarantee the message freshness, a rolling code sequence is appended with the transmitted message. In this paper, various feedback shift registers were analyzed for generating the rolling code and a polynomial based Key distribution scheme is proposed for secured communication protocol in Wireless Personal Area Network. Nonlinear feedback shift register with high linear complexity is used for generating the rolling code. Also the Node Capture Impact for the proposed scheme is compared with other existing scheme. The proposed scheme features a Node Capture Impact equals to zero for even any number of compromised nodes, which is recommended characteristic of a key distribution scheme.

Polynomial based key distribution scheme for WPAN

Rossi D.;
2013-01-01

Abstract

Security plays a vital role in Wireless Personal Area Network where the data has to be transmitted in free space. The security of the data depends upon the key used for encryption/decryption. Also a secret key has to be shared among the nodes to establish a secure link. The secret key should be resilient to attacks. Key distribution among the nodes in Wireless Personal Area Network is a challenging task. To guarantee the message freshness, a rolling code sequence is appended with the transmitted message. In this paper, various feedback shift registers were analyzed for generating the rolling code and a polynomial based Key distribution scheme is proposed for secured communication protocol in Wireless Personal Area Network. Nonlinear feedback shift register with high linear complexity is used for generating the rolling code. Also the Node Capture Impact for the proposed scheme is compared with other existing scheme. The proposed scheme features a Node Capture Impact equals to zero for even any number of compromised nodes, which is recommended characteristic of a key distribution scheme.
2013
Vimalathithan, R.; Rossi, D.; Omana, M.; Metra, C.; Valarmathi, M. L.
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11568/1048806
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? ND
social impact