DOI QR코드

DOI QR Code

Secure Key Management Protocol in the Wireless Sensor Network

  • Jeong, Yoon-Su (Dept. of Electronics and Computer Engineering, Chungbuk National University) ;
  • Lee, Sang-Ho (Dept. of Electronics and Computer Engineering, Chungbuk National University)
  • Published : 2006.03.01

Abstract

To achieve security in wireless sensor networks (WSN), it is important to be able to encrypt messages sent among sensor nodes. We propose a new cryptographic key management protocol, which is based on the clustering scheme but does not depend on the probabilistic key. The protocol can increase the efficiency to manage keys since, before distributing the keys by bootstrap, the use of public keys shared among nodes can eliminate the processes to send or to receive keys among the sensors. Also, to find any compromised nodes safely on the network, it solves safety problems by applying the functions of a lightweight attack-detection mechanism.

Keywords

References

  1. W. Heinzelman, A. Chandrakasan, H. Balakrishnan, 'Energy Efficient Communication protocol for Wireless Microsensor Networks', Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, pp. 3005-3014, Jan. 2000
  2. H. Chan, A. Perrig and D. Song, 'Random key predistribution schemes for Sensor networks', In IEEE Symposium on Research in Security and Privacy, pp. 197-213, May. 2003
  3. D. Carman, P. Kruus, and B. Matt, 'Constraints and approaches for distributed sensor network security', Tech. Rep. 00-010, NAI Labs, September 2000. http://download.nai.com/products/media/nai/zip/nailabs-report-00-010-final.zip
  4. R. L. Rivest, A. Shamir, and L. M. Adleman, 'A method for obtaining digital signatures and public-key cryptosystems', Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978 https://doi.org/10.1145/359340.359342

Cited by

  1. A Dynamic Secure Access Mechanism for Wireless Sensor Networks Using Usage Control and Agent Technology vol.E94.B, pp.6, 2011, https://doi.org/10.1587/transcom.E94.B.1577
  2. On the security and improvement of a two-factor user authentication scheme in wireless sensor networks vol.17, pp.5, 2013, https://doi.org/10.1007/s00779-012-0540-3
  3. Efficient security mechanism to counter the malicious attack in wireless sensor networks vol.2, pp.1, 2014, https://doi.org/10.1007/s40012-014-0042-8
  4. User authentication schemes for wireless sensor networks: A review vol.27, 2015, https://doi.org/10.1016/j.adhoc.2014.11.018
  5. Large scale wireless sensor networks with multi-level dynamic key management scheme vol.59, pp.9, 2013, https://doi.org/10.1016/j.sysarc.2013.05.022
  6. Exploiting SIMD parallelism on dynamically partitioned parallel network coding for P2P systems vol.39, pp.1, 2013, https://doi.org/10.1016/j.compeleceng.2012.02.009