A Research on Key Management in Wireless Sensor Networks

Article Preview

Abstract:

With the constant development of wireless sensor networks technology, the expanding application scope and the increasing processing power of sensor nodes, there are more and more data collected and processed through the sensor, thus ensuring the security of information transmission between nodes is in urgent needs. The secure application of wireless sensor networks has become a hot technology. This paper mainly expounds the key management schemes of wireless sensor networks, and analyzes the mainstream key management schemes.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

247-250

Citation:

Online since:

February 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Ten emerging technologies that will change the world[N]. Technology Review. 2003, 106(1). 22-49.

Google Scholar

[2] Tubaishat M. Madria S. Sensor networks: an overview IEEE Protential, 2003, 22(2): 20-23.

Google Scholar

[3] Fei Hu, Neeraj. K, Security considerations in ad hoc sensor networks. Ad Hoc Networks, 2005, (3): 69-89.

DOI: 10.1016/j.adhoc.2003.09.009

Google Scholar

[4] Bo-Chen Charles Lai, David D. Hwang, Sungha Pete Kim et al. Reducing Radio Energy Consumption of Key Management Protocols for Wireless Sensor Networks. ISLPED'04, Angustg9-11, 2000, Nerport Beach, California, USA.

Google Scholar

[5] Joo young Lee, Douglas R. Stinson. Deterministic Key Pre-distribution Schemes for Distributed Sensor Networks. In Proceedings of the 10th ACM Conference, Lecture Notes in Computer Science, Springer-Verlag, Berlin Germany, 2004, 3357: 172-194.

Google Scholar

[6] Laurent Eschenauer and Virgil D. Gligor. A key management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communication Security, Pages41-47, November2002.

DOI: 10.1145/586110.586117

Google Scholar

[7] H Chan, A Perrig, D Song. Random key pre-distribution schemes for sensor networks[A] Proceedings of IEEE 2003 Symposium on Research in Security and Privacy. Berkeley, CA: IEEE Computer Society[C]. 2003, 197-213.

Google Scholar

[8] Liu D, Ning P. Location Based Pair-wise Key Establishments for Static Sensor Networks. The 10th ACM Conference on Computer and Communications Security, 2003, 10.

DOI: 10.1145/986858.986869

Google Scholar