The Key Management Scheme For the WMSN-Based Post-Disaster Road Monitoring System

Article Preview

Abstract:

In order to obtain the availability of roads and bridges after earthquake, a real-time monitoring system is build by wireless sensor networks. And a new key management scheme is proposed to protect the safety of the system. The scheme is based on the polynomial and the Chinese Remainder Theorem, divided into three stages which are system initialization, key establishment, node join and revocation. Analysis shows that the new scheme greatly reduces the storage space and the energy consumption of calculation and communication of node. It is suitable for post-disaster road monitoring system.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 756-759)

Pages:

332-337

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Eschenauer L,Gligor V D. A key~management scheme for distributed sensor networks [A]. Proc 9th ACM Conf on Computer and Communication Security [C]. Washington DC, 2002: 41~47.

DOI: 10.1145/586110.586117

Google Scholar

[2] Chan H W,Perrig A,Song D. Random Key predistribution schemes for sensor networks [A]. Proc 2003 IEEE Symp on Security and Privacy[C].Berkeley, California, 2003: 197.

Google Scholar

[3] Du Wen-liang, Deng Jing. A pairwise key pre-distribution scheme for wireless sensor networks[C]. Proc of the 10th ACM Conference on Computer and Communications Security. (2003).

DOI: 10.1145/948109.948118

Google Scholar

[4] Liu Dong-gang,Ning Peng. Establishing pairwise keys in distributed sensor networks[C]. Proc of the 10th ACM Conference on Computer and Communication Security. New York: ACM Press, 2003: 52-61.

DOI: 10.1145/948109.948119

Google Scholar

[5] ZHU S, SETIA S, JAJODIA S. Leap: efficient security mechanisms for large-scale distributed sensor networks[C]. Proc of the 10th ACM Conference on Computer and Communications Security. [S.I. ]: ACM Press, 2003: 62-72.

DOI: 10.1145/948109.948120

Google Scholar

[6] Zheng Xin-liang, Huang C T,Matthews M. Chinese remainder theorem based group key management[C]. Proc of ACMSE 2007. 2007: 266-2.

DOI: 10.1145/1233341.1233389

Google Scholar