Journal on Communications ›› 2018, Vol. 39 ›› Issue (10): 87-96.doi: 10.11959/j.issn.1000-436x.2018221

• Papers • Previous Articles     Next Articles

WSN key recovery attack based on symmetric matrix decomposition

Xiangmin JI1,2,Bo ZHAO1(),Jinhui LIU3,Jianwei JIA4,Huanguo ZHANG1,Shuang XIANG5   

  1. 1 Key Laboratory of Aerospace Information Security and Trusted Computing,Ministry of Education,School of Cyber Science and Engineering,Wuhan University,Wuhan 430072,China
    2 College of Computer Information Science,Fujian Agriculture and Forestry University,Fuzhou 350002,China
    3 School of Computer Science,Shaanxi Normal University,Xi’an 710119,China
    4 Huawei Technologies Co.,Ltd.,Xi’an 710075,China
    5 Yangtze River Engineering Supervision Consulting Co.,Ltd.,Wuhan 430015,China
  • Revised:2018-07-22 Online:2018-10-01 Published:2018-11-23
  • Supported by:
    The National Basic Research Program of China (973 Program)(2014CB340600);The National High Technology Research and Development Program of China (863 Program)(2015AA016002);The Major Program of National Natural Science Foundation of China(61332039);The Fundamental Research Funds for the Central Universities(GK201803061);The Postdoctoral Science Foundation Project of China(2018M631121);The Natural Science Foundation of Fujian Province(2016J01285)

Abstract:

The key protocol is one of the crucial technologies to ensure the security for wireless sensor network(WSN).Parakh,et al.proposed a key agreement for WSN based on matrix decomposition.However,the study revealed that the protocol had security risks.A key recovery attack scheme against this protocol was proposed by using the properties of symmetric matrix and permutation matrix.Based on intercepting the row and column vector of the node,elementary transformation was performed to construct a linear algebraic attack algorithm and the equivalent key was obtained.The computational complexity is O(N6).Experimental results show that the method can recover the equivalent key of the above protocol within the polynomial computational complexity and the memory consumption is within an acceptable range.In addition,an improved scheme for key agreement was proposed to resist the linear algebraic attack by using a random disturbance matrix,and the correctness and security analysis were also carried out.

Key words: key protocol, key recovery, matrix decomposition, homogeneous linear equations solving, wireless sensor network

CLC Number: 

No Suggested Reading articles found!