WSN key recovery attack based on symmetric matrix decomposition
The key protocol is one of the crucial technologies to ensure the security for wireless sensor network(WSN).Parakh,et al.proposed a key agreement for WSN based on matrix decomposition.However,the study revealed that the protocol had security risks.A key recovery attack scheme against this protocol w...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2018-10-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018221/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539426400862208 |
---|---|
author | Xiangmin JI Bo ZHAO Jinhui LIU Jianwei JIA Huanguo ZHANG Shuang XIANG |
author_facet | Xiangmin JI Bo ZHAO Jinhui LIU Jianwei JIA Huanguo ZHANG Shuang XIANG |
author_sort | Xiangmin JI |
collection | DOAJ |
description | The key protocol is one of the crucial technologies to ensure the security for wireless sensor network(WSN).Parakh,et al.proposed a key agreement for WSN based on matrix decomposition.However,the study revealed that the protocol had security risks.A key recovery attack scheme against this protocol was proposed by using the properties of symmetric matrix and permutation matrix.Based on intercepting the row and column vector of the node,elementary transformation was performed to construct a linear algebraic attack algorithm and the equivalent key was obtained.The computational complexity is O(N<sup>6</sup>).Experimental results show that the method can recover the equivalent key of the above protocol within the polynomial computational complexity and the memory consumption is within an acceptable range.In addition,an improved scheme for key agreement was proposed to resist the linear algebraic attack by using a random disturbance matrix,and the correctness and security analysis were also carried out. |
format | Article |
id | doaj-art-683eb56022d74b6ea0da9d30c13422c5 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2018-10-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-683eb56022d74b6ea0da9d30c13422c52025-01-14T07:15:38ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2018-10-0139879659721230WSN key recovery attack based on symmetric matrix decompositionXiangmin JIBo ZHAOJinhui LIUJianwei JIAHuanguo ZHANGShuang XIANGThe key protocol is one of the crucial technologies to ensure the security for wireless sensor network(WSN).Parakh,et al.proposed a key agreement for WSN based on matrix decomposition.However,the study revealed that the protocol had security risks.A key recovery attack scheme against this protocol was proposed by using the properties of symmetric matrix and permutation matrix.Based on intercepting the row and column vector of the node,elementary transformation was performed to construct a linear algebraic attack algorithm and the equivalent key was obtained.The computational complexity is O(N<sup>6</sup>).Experimental results show that the method can recover the equivalent key of the above protocol within the polynomial computational complexity and the memory consumption is within an acceptable range.In addition,an improved scheme for key agreement was proposed to resist the linear algebraic attack by using a random disturbance matrix,and the correctness and security analysis were also carried out.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018221/key protocolkey recoverymatrix decompositionhomogeneous linear equations solvingwireless sensor network |
spellingShingle | Xiangmin JI Bo ZHAO Jinhui LIU Jianwei JIA Huanguo ZHANG Shuang XIANG WSN key recovery attack based on symmetric matrix decomposition Tongxin xuebao key protocol key recovery matrix decomposition homogeneous linear equations solving wireless sensor network |
title | WSN key recovery attack based on symmetric matrix decomposition |
title_full | WSN key recovery attack based on symmetric matrix decomposition |
title_fullStr | WSN key recovery attack based on symmetric matrix decomposition |
title_full_unstemmed | WSN key recovery attack based on symmetric matrix decomposition |
title_short | WSN key recovery attack based on symmetric matrix decomposition |
title_sort | wsn key recovery attack based on symmetric matrix decomposition |
topic | key protocol key recovery matrix decomposition homogeneous linear equations solving wireless sensor network |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2018221/ |
work_keys_str_mv | AT xiangminji wsnkeyrecoveryattackbasedonsymmetricmatrixdecomposition AT bozhao wsnkeyrecoveryattackbasedonsymmetricmatrixdecomposition AT jinhuiliu wsnkeyrecoveryattackbasedonsymmetricmatrixdecomposition AT jianweijia wsnkeyrecoveryattackbasedonsymmetricmatrixdecomposition AT huanguozhang wsnkeyrecoveryattackbasedonsymmetricmatrixdecomposition AT shuangxiang wsnkeyrecoveryattackbasedonsymmetricmatrixdecomposition |