z-logo
open-access-imgOpen Access
Hierarchical secret sharing scheme for WSN based on linear homogeneous recurrence relations
Author(s) -
Yan Lin,
Hongliang Zhu,
Guizhi Xu,
Guosheng Xu
Publication year - 2022
Publication title -
international journal of distributed sensor networks
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.324
H-Index - 53
eISSN - 1550-1477
pISSN - 1550-1329
DOI - 10.1177/15501329221088740
Subject(s) - computer science , wireless sensor network , secret sharing , computer network , scheme (mathematics) , key distribution in wireless sensor networks , key (lock) , the internet , homogeneous , wireless network , wireless , theoretical computer science , computer security , cryptography , telecommunications , world wide web , mathematics , mathematical analysis , combinatorics
Wireless sensor network is a key technology in the sensing layer of the Internet of Things. Data security in wireless sensor network is directly related to the authenticity and validity of data transmitted in the Internet of Things. Due to the large number and different types of nodes in wireless sensor networks, layered secret key sharing technology is increasingly used in wireless sensor networks. In a hierarchical secret sharing scheme, participants are divided into sections with different permissions for each team, but the same permissions for participants in the same team. In this article, we follow the approach of the hierarchical secret sharing scheme derived from the linear homogeneous recurrence relations. We design a hierarchical multi-secret sharing scheme for wireless sensor networks on the basis of the elliptic curve public key cryptosystem combined with the linear homogeneous recurrence relations. In the proposed scheme, we do not make sure that the participants are half-truthful. In addition, the participants’ shadows can be reused. Our scheme is computational security. Only one share from each member is required in our hierarchical multi-secret sharing scheme. It is more suitable for wireless sensor networks compared to the up-to-date schemes.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here