A Novel Key Management Strategy for Heterogeneous Wireless Sensor Networks

Article Preview

Abstract:

A key management strategy is presented for heterogeneous wireless sensor networks. The wireless sensor networks have some sensor nodes which have greater power and transmission capability than other nodes have. Both ordinary nodes and heterogeneous nodes are evenly distributed in sensing square area respectively. The pairwise keys between nodes are established through utilizing the concept of the overlap key sharing and the random key predistribution scheme. Analysis and comparison demonstrate that the connectivity and security of wireless sensor networks have been improved obviously even with some heterogeneous nodes.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

224-229

Citation:

Online since:

September 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] S. A. Camtepe, and B. Yener. Key Distribution Mechanisms for Wireless Sensor networks: a Survey, TR-05-07 Rensselaer Polytechnic Institute Computer Science Department, (2005).

Google Scholar

[2] D. Liu, P. Ning, and R. Li. Establishing, Pair-wise Keys in Distributed Sensor Networks, , ACM Trans., Inf. Syst. Secur., Vol. 8, No. 1, pp.41-77, (2005).

DOI: 10.1145/1053283.1053287

Google Scholar

[3] S. Camtepe, B. Yener. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks, 9th European Symposium on Resaerch Computer Security, pp, 293-308, (2004).

DOI: 10.1007/978-3-540-30108-0_18

Google Scholar

[4] M. Bohge, and W. Trappe. An Authentication Framework for Hieranchical Ad hoc Sensor Networks, ACM workshop on Wireless Security, San Diego, CA, USA, pp.79-87, (2003).

DOI: 10.1145/941311.941324

Google Scholar

[5] Kejie Lu, Yi Qian, Mohsen Guizani, Hsiao-Hwa Chen. A Framework for a Distributed Key Management Scheme in Heterogeneous Wireless Sensor Networks, IEEE TRANSACTION ON WIRELESS COMMUNICATIONS, VOL. 7, NO. 2, pp.639-647, FEBRUARY (2008).

DOI: 10.1109/twc.2008.060603

Google Scholar

[6] K. P. Shih, S. S Wang, P. H. Yang, C. C. Chang. CollECT: collaborative event detection and tracking in wireless heterogeneous sensor networks, In: Proceedings of the 11th IEEE symposium on computers and communications (ISCC 2006); June 2006, pp.935-940, (2006).

DOI: 10.1109/iscc.2006.50

Google Scholar

[7] L. Eschenauer and V. D. Gligor, A key-management scheme for distributed sensor networks, " in Proc. CCS, 02: 9th ACM Conference on Computer and Communications Security. New York: ACM Press, Nov. 2002, pp.41-47, (2002).

DOI: 10.1145/586110.586117

Google Scholar

[8] H. Chan, A. Perrig, D. Song. Random key predistribution schemes for sensor networks, Proceedings of the IEEE Syrup. On Research in Security and Privacy, Berkeley, CA, USA, May 11-14 2003, pp.197-213, (2003).

Google Scholar

[9] C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, M. Yung. Perfectly-secure key distribution for dynamic conferences", in Proc. CRYPTO, 92: 12th Annual International Cryptology Conference on Advances in Cryptology. London: Springer-Verlag, 1992, pp.471-486, (1992).

DOI: 10.1007/3-540-48071-4_33

Google Scholar

[10] D. Liu and P. Ning. Establishing pairwise keys in distributed sensor networks", in Proc. CCS, 03: 10th ACM Conference on Computer and Communications Security. New York: ACM Press, 2003, pp.52-61, (2003).

DOI: 10.1145/948109.948119

Google Scholar

[11] D. Lai, Hwang S. Kim, I. Verbauehrde. Reducing Radio Energy Consumption of Key Management Protocols for Wireless Sensor Networks", Proceedings of ACM/ IEEE International Symposium on Low Power Electronics and Design (ISLPED, 04), 2004, pp.351-356, (2004).

DOI: 10.1145/1013235.1013320

Google Scholar