{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T02:48:20Z","timestamp":1760237300124,"version":"build-2065373602"},"reference-count":25,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2020,4,1]],"date-time":"2020-04-01T00:00:00Z","timestamp":1585699200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772185"],"award-info":[{"award-number":["61772185"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The smart robot is playing an increasingly important role in the social economy, and multi-robot systems will be an important development in robotics. With smart sensing systems, the communications between sensors, actuators, and edge computing systems and robots are prone to be attacked due to the highly dynamic and distributed environment. Since smart robots are often distributed in open environments, as well as due to their limited hardware resources and security protection capabilities, the security requirements of their keys cannot be met with traditional key distribution algorithms. In this paper, we propose a new mechanism of key establishment based on high-order polynomials to ensure the safe key generation and key distribution. Experiments show that the key establishment mechanism proposed in this paper guarantees the security of keys; its storage cost and communication cost are smaller than state-of-the-art mechanisms; and it allows robot components to join and leave the network dynamically, which is more suitable for multi-robot systems.<\/jats:p>","DOI":"10.3390\/s20071970","type":"journal-article","created":{"date-parts":[[2020,4,2]],"date-time":"2020-04-02T11:57:14Z","timestamp":1585828634000},"page":"1970","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Secure Key Establishment Mechanism for Smart Sensing System Based Robots Network"],"prefix":"10.3390","volume":"20","author":[{"given":"Qi","family":"Xiao","sequence":"first","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha 410000, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2115-858X","authenticated-orcid":false,"given":"Yunchuan","family":"Qin","sequence":"additional","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha 410000, China"},{"name":"SZZT Electronics Co., Ltd., SZZT Industrial Park, No.3 Tongguan Rd, Guangming District, Shenzhen 518000, China"}]},{"given":"Cheng","family":"Xu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha 410000, China"}]},{"given":"Kenli","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer Science and Electronic Engineering, Hunan University, Changsha 410000, China"}]}],"member":"1968","published-online":{"date-parts":[[2020,4,1]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"69524","DOI":"10.1109\/ACCESS.2019.2917277","article-title":"Air Quality Forcasting based on Gated Recurrent Long Short Term Memory Model in Internet of Things","volume":"7","author":"Baowei","year":"2019","journal-title":"IEEE Access."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1126\/scirobotics.aar7650","article-title":"The grand challenges of Science Robotics","volume":"3","author":"Yang","year":"2018","journal-title":"Sci. Robot."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1079","DOI":"10.1007\/s10514-018-9783-9","article-title":"Distributed multi-robot formation control in dynamic environments","volume":"43","author":"Montijano","year":"2019","journal-title":"Auton. Robot."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"984","DOI":"10.1109\/TASE.2016.2544749","article-title":"Parallel multiagent coordination optimization algorithm: Implementation, evaluation, and applications","volume":"14","author":"Zhang","year":"2016","journal-title":"IEEE Trans. Autom. Sci. Eng."},{"key":"ref_5","first-page":"1217","article-title":"Research on Data Fusion of Adaptive Weighted Multi-Source Sensor","volume":"61","author":"Donghui","year":"2019","journal-title":"Comput. Mater. Contin."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"961","DOI":"10.1109\/LCOMM.2017.2649496","article-title":"On the Key Generation From Correlated Wireless Channels","volume":"21","author":"Zhang","year":"2017","journal-title":"IEEE Commun. Lett."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/TIFS.2018.2837661","article-title":"Secret Group-Key Generation at Physical Layer for Multi-Antenna Mesh Topology","volume":"14","author":"Thai","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., and Gligor, D. (2002, January 18\u201322). A Key-Management Scheme for Distributed Sensor Networks. Proceedings of the 9th ACM conference on Computer and communications security(CCS2002), Washington, DC, USA.","DOI":"10.1145\/586110.586117"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"500","DOI":"10.1145\/1218556.1218559","article-title":"LEAP+: Efficient security mechanisms for large-scale distributed sensor networks","volume":"2","author":"Zhu","year":"2006","journal-title":"ACM Trans. Sens. Netw."},{"key":"ref_10","unstructured":"Jiyong, J., Taekyoung, K., and Jooseok, S. (2007, January 7\u20139). A time-based key management protocol for wireless sensor networks. Proceedings of the International Conference on Information Security Practice and Experience(ISPEC2007), Hong Kong, China."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Naor, M., Pinkas, B., and Reingold, O. (1999, January 2\u20136). Distributed pseudo-random functions and KDCs. Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Prague, Czech Republic.","DOI":"10.1007\/3-540-48910-X_23"},{"key":"ref_12","first-page":"376","article-title":"Can the polynomial based key predistribution scheme be used many times in one wireless sensor network key establishment protocol?","volume":"18","author":"Xu","year":"2013","journal-title":"JST EI"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1007\/s10776-011-0169-6","article-title":"Secure and energy-efficient traffic-aware key management scheme for wireless sensor network","volume":"19","author":"Kousalya","year":"2012","journal-title":"Int. J. Wirel. Inform. Netw."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1419","DOI":"10.1007\/s11277-015-2290-9","article-title":"A novel hybrid key management scheme for establishing secure communication in wireless sensor networks","volume":"82","author":"Anita","year":"2015","journal-title":"Wirel. Pers. Commun."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/s11277-017-5040-3","article-title":"An authentication key establish protocol for WSNs based on combined key","volume":"99","author":"Zhang","year":"2018","journal-title":"Wirel. Pers. Commun."},{"key":"ref_16","first-page":"38","article-title":"The era of cloud communication has arrived","volume":"2","author":"Zhang","year":"2014","journal-title":"Telecommun. Inf. Netw. Commun."},{"key":"ref_17","unstructured":"ANSI (2013). Information technology\u2014Security Technology\u2014Key Management\u2014Part 1, ANSI. Framework; Tech. Report."},{"key":"ref_18","first-page":"759","article-title":"An Efficient Quantum Key Distribution Protocol with Dense Coding on Single Photons","volume":"61","author":"Hao","year":"2019","journal-title":"Comput. Mater. Contin."},{"key":"ref_19","first-page":"305","article-title":"A New NTRU-Type Public-Key Cryptosystem over the Binary Field","volume":"60","author":"Youyu","year":"2019","journal-title":"Comput. Mater. Contin."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1026","DOI":"10.1002\/sec.1057","article-title":"Efficient self-healing group key management with dynamic revocation and collusion resistance for SCADA in smart grid","volume":"8","author":"Rong","year":"2015","journal-title":"Secur. Commun. Netw."},{"key":"ref_21","unstructured":"Yunchuan, Q., and Qi, X. (2017, January 20\u201323). Polynomial-based Key Management Scheme for robotic system. Proceedings of the 8th International Conference on Computer Modeling and Simulation(ICCMS2017), Canberra, Australia."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.adhoc.2006.05.007","article-title":"Self-healing group key distribution with time-limited node revocation for wireless sensor networks","volume":"5","author":"Jiang","year":"2007","journal-title":"Ad Hoc Netw."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"619","DOI":"10.3923\/itj.2009.619.624","article-title":"Anti-collusive Self-healing Key Distribution Scheme with Revocation Capability","volume":"8","author":"Du","year":"2009","journal-title":"Inf. Technol. J."},{"key":"ref_24","unstructured":"Rong, J., Rongxing, L., Chengzhe, L., Jun, L., and Xuemin, S. (2013, January 9\u201313). Robust group key management with revocation and collusion resistance for SCADA in smart grid. Proceedings of the IEEE Global Communications Conference(GLOBECOM2013), Atlanta, GA, USA."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Biming, T., Song, H., Tharam, D., and Sajal, D. (2008, January 23\u201326). A self-healing key distribution scheme based on vector space secret sharing and one way hash chains. Proceedings of the 9th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, Newport Beach, CA, USA.","DOI":"10.1109\/WOWMOM.2008.4594921"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/7\/1970\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T09:14:08Z","timestamp":1760174048000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/7\/1970"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,1]]},"references-count":25,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2020,4]]}},"alternative-id":["s20071970"],"URL":"https:\/\/doi.org\/10.3390\/s20071970","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2020,4,1]]}}}