©1994-2009ChinaAcademicJournalElectronicPublishingHouse.Allrightsreserved.(2009)0220117205,(,100044):WSNWSN,.,,,,.,,WSN.:;;;:TP393:AAnImprovementofHypercube-BasedKeyPre-DistributionSchemeforWirelessSensorNetworkWUHao,CHENGChao(StateKeyLaboratoryofRailTrafficControlandSafety,BeijingJiaotongUniversity,Beijing100044,China)Abstract:SecuritybecomesthemostimportantandbasicaspectofWSNresearchbecauseofWSNsowncharacteristics,especiallythekeymanagementmechanism.ThepaperproposedanimprovementoftheHypercube-basedschemebasedondual-variatepolynomialsbydeepanalysis.Thenewschemereservesthemeritoflessmemorythanotherschemesandovercomesthedrawbackoflackingkeyupdateability.ThenewHypercube-basedschemecanupdatekeyandimprovethesystemsecuri2tywithlittlememoryincrease.ItismoresuitableforWSNspracticalapplication.Keywords:wirelesssensornetwork;security;hypercube-basedkeypre-distributionscheme;keyupdate:2008-08-19:-(60830001):(1973),,,,.email:hwu@bjtu.edu.cn.(1985),,,.21,,(WirelessSensorNetwork,WSN).[122].WSN,.,.,.,[2].WSN,,WSN33220094JOURNALOFBEIJINGJIAOTONGUNIVERSITYVol.33No.2Apr.2009©1994-2009ChinaAcademicJournalElectronicPublishingHouse.Allrightsreserved.(Sinkhole),,WSN.WSN,,.WSN,WSN,,WSN.1,,,.,,.EschenauerGligorWSN(E-G)[3].P,K(KnP),,(pair2wisekey);.WSN,Chanq2composite[4],|S|m,q.Blom[5],.Du[6],N,,GF(q)(q)(+1)NG(G(+1))(+1)(+1)D1,D2,,D,(Di,G).Kij=Kji,KijKji.A=(DG)T.(AG)T=GTAT=GTD=GTDTG=(DG)TG=AGAG,A,i,,Aj,G,AiGj,AGKij,AjGiAGKji,Kij=Kji.Blundo[7],f(x,y)=ni,j=0aijxiyjf(x,y)=f(y,x),:i,jx,y;aij.:GF(q)f(x,y).12,2N1,2,1N2,f(N1,N2)=f(N2,N1),.Liu[8],,S,,,.LiuChan[4,8].Liu(Grid2BasedKeyPredistribution,GBKP)1[8]:Nmm,m=N.2m,,,,,,.1,12.Chan(PeerIntermediariesforKeyEstablish2ment,PIKE)[4],,,,,,,81133©1994-2009ChinaAcademicJournalElectronicPublishingHouse.Allrightsreserved.[8],,.,,.,,,WSN.2.211N,n,GF(q)mn-1ntfji1,i2,,in-1(x,y)|0i1,i2,,in-1m,m=|nN|,1jn,jmn-1fji1,i2,,in-1(x,y)|0i1,i2,,in-1m.,f1j1,j2,,jn-1(x,y),,fnj1,j2,,jn-1(x,y),,.(j2,,jn)ID,jiiID,l,l=lbm.n,m,n(m-1).212,K,,.ID..,ID{ID,K},,ID.ID,.ID,.213,,.T,T..11)1ABf(IDA,IDB),A(x,y)=0ia,1jtaijxiyj,,,;(x,y)x,yt.(x,y)=f(x,y)+(x,y),(ai,y).aiID,(ai.y)A,A(x,y).,A.2).,A(ai,y)(ai,c),cA.(x,y)x,(ai,c),(x,c),(x,c)=0kabkxk,9112:©1994-2009ChinaAcademicJournalElectronicPublishingHouse.Allrightsreserved.(IDA,c)=(IDA,c)-(IDA,c),IDA=(IDA).IDA=IDA+1.3)1,,,TimestampFlag.Flag,0.Timestamp,,,,Timestamp0,,Flag1,.,(x,y),(ai.y),.212Fig.2Processofkeyupdate214,ID,1,2,.,jk=ik(1kn-1,dk=1),i,jfnj1,j2,,jn-1(x,y),.ID1,,..dk=a,(a-1).m=3,123321,123323321,.Liu[8],.3311()Liu[8]2t,n(t+1)lbq+ntl.n(t+1)lbqnt,ntlID.,(ai.y).[n(t+1)+(m-1)(t+1)]lbq+ntl.[n(t+1)+(m-1)(t+1)]lbq(ai,y).n(t+1)lbq..312:,,1.,.m,(x,y),,tt,(x,y),.t+1,t(ai,y)..:11.,.T5,u.:5u,pc=5uN.kP(k)=[n(m-1)]!k![n(m-1)-k]!pkc(1-pc)n(m-1)-k,kt,,P(x)=1-ti=0P(k).:u,02133©1994-2009ChinaAcademicJournalElectronicPublishingHouse.Allrightsreserved.=uN.k(ai,y)P(k)=[n(m-1)]!k![n(m-1)-k]!pkc(1-pc)n(m-1)-k,P(x)=1-i=0P(k)1T.3.010801909637,;010801620784,.3Fig.3ProportionalrelationshipofcompromisednodeandcompromisedkeynumberT.,,,.,,,.4,,,.WSN.WSN,,,WSN.,,,.:[1]AkyildizF,SuW,SankarasubramaniamY,etal.ASur2veyonSensorNetworks[C]ComputerNetworks,2002,38(4):393-422.[2],,.[J].,2003,14(7):1282-1290.RENFengyuan,HUANGHaining,LINChuang.Wire2lessSensorNetwork[J].JournalofSoftware,2003,14(7):1282-1290.(inChinese)[3]EschenauerL,GligorVD.AKey2ManagementSchemeforDistributedSensorNetworks[C]Proceedingofthe9thACMConferenceonComputerandCommunicationSe2curity,2002:41-47.[4]CHANH,PERRIGA,SONGD.RandomKeyPredistri2butionSchemesforSensorNetworks[C]IEEESympo2siumonResearchinSecurityandPrivacy,2003:197-213.[5]BLOMR.AnOptimalClassofSymmetricKeyGenerationSystems[C]AdvancesinCryptology:ProceedingsofEUROCRYPT84(ThomasBeth,NorbertCot,andIn2gemarIngemarsson,eds.)LectureNotesinComputerSci2ence.Springer-Verlag,1982:335-338.[6]DUW,DENGJ,HANYS,etal.AKeyManagementSchemeforWirelessSensorNetworksUsingDeploymentKnowledge[C]ProceedingsofIEEEINFOCOM04,2004:42-51.[7]BlundoC,SantisAD,HerzbergA,etal.Perfectly:SecureKeyDistributionforDynamicConferences[C]AdvancesinCryptology-CRYPTO92.LNCS740,1993:471-486.[8]LIUD,NINGP.EstablishingPairwiseKeysinDistribut2edSensorNetworks[C]Proceedingsof10thACMCon2ferenceonComputerandCommunicationsSecurity(CCS03),2003:52-61.1212: