WSN key recovery attack based on symmetric matrix decomposition

The key protocol is one of the crucial technologies to ensure the security for wireless sensor network(WSN).Parakh,et al.proposed a key agreement for WSN based on matrix decomposition.However,the study revealed that the protocol had security risks.A key recovery attack scheme against this protocol w...

Full description

Saved in:
Bibliographic Details
Main Authors: Xiangmin JI, Bo ZHAO, Jinhui LIU, Jianwei JIA, Huanguo ZHANG, Shuang XIANG
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2018-10-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018221/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539426400862208
author Xiangmin JI
Bo ZHAO
Jinhui LIU
Jianwei JIA
Huanguo ZHANG
Shuang XIANG
author_facet Xiangmin JI
Bo ZHAO
Jinhui LIU
Jianwei JIA
Huanguo ZHANG
Shuang XIANG
author_sort Xiangmin JI
collection DOAJ
description The key protocol is one of the crucial technologies to ensure the security for wireless sensor network(WSN).Parakh,et al.proposed a key agreement for WSN based on matrix decomposition.However,the study revealed that the protocol had security risks.A key recovery attack scheme against this protocol was proposed by using the properties of symmetric matrix and permutation matrix.Based on intercepting the row and column vector of the node,elementary transformation was performed to construct a linear algebraic attack algorithm and the equivalent key was obtained.The computational complexity is O(N<sup>6</sup>).Experimental results show that the method can recover the equivalent key of the above protocol within the polynomial computational complexity and the memory consumption is within an acceptable range.In addition,an improved scheme for key agreement was proposed to resist the linear algebraic attack by using a random disturbance matrix,and the correctness and security analysis were also carried out.
format Article
id doaj-art-683eb56022d74b6ea0da9d30c13422c5
institution Kabale University
issn 1000-436X
language zho
publishDate 2018-10-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-683eb56022d74b6ea0da9d30c13422c52025-01-14T07:15:38ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2018-10-0139879659721230WSN key recovery attack based on symmetric matrix decompositionXiangmin JIBo ZHAOJinhui LIUJianwei JIAHuanguo ZHANGShuang XIANGThe key protocol is one of the crucial technologies to ensure the security for wireless sensor network(WSN).Parakh,et al.proposed a key agreement for WSN based on matrix decomposition.However,the study revealed that the protocol had security risks.A key recovery attack scheme against this protocol was proposed by using the properties of symmetric matrix and permutation matrix.Based on intercepting the row and column vector of the node,elementary transformation was performed to construct a linear algebraic attack algorithm and the equivalent key was obtained.The computational complexity is O(N<sup>6</sup>).Experimental results show that the method can recover the equivalent key of the above protocol within the polynomial computational complexity and the memory consumption is within an acceptable range.In addition,an improved scheme for key agreement was proposed to resist the linear algebraic attack by using a random disturbance matrix,and the correctness and security analysis were also carried out.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018221/key protocolkey recoverymatrix decompositionhomogeneous linear equations solvingwireless sensor network
spellingShingle Xiangmin JI
Bo ZHAO
Jinhui LIU
Jianwei JIA
Huanguo ZHANG
Shuang XIANG
WSN key recovery attack based on symmetric matrix decomposition
Tongxin xuebao
key protocol
key recovery
matrix decomposition
homogeneous linear equations solving
wireless sensor network
title WSN key recovery attack based on symmetric matrix decomposition
title_full WSN key recovery attack based on symmetric matrix decomposition
title_fullStr WSN key recovery attack based on symmetric matrix decomposition
title_full_unstemmed WSN key recovery attack based on symmetric matrix decomposition
title_short WSN key recovery attack based on symmetric matrix decomposition
title_sort wsn key recovery attack based on symmetric matrix decomposition
topic key protocol
key recovery
matrix decomposition
homogeneous linear equations solving
wireless sensor network
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018221/
work_keys_str_mv AT xiangminji wsnkeyrecoveryattackbasedonsymmetricmatrixdecomposition
AT bozhao wsnkeyrecoveryattackbasedonsymmetricmatrixdecomposition
AT jinhuiliu wsnkeyrecoveryattackbasedonsymmetricmatrixdecomposition
AT jianweijia wsnkeyrecoveryattackbasedonsymmetricmatrixdecomposition
AT huanguozhang wsnkeyrecoveryattackbasedonsymmetricmatrixdecomposition
AT shuangxiang wsnkeyrecoveryattackbasedonsymmetricmatrixdecomposition