期刊文献+

Application Independent Dynamic Group-Based Key Establishment for Large-scale Wireless Sensor Networks

Application Independent Dynamic Group-Based Key Establishment for Large-scale Wireless Sensor Networks
下载PDF
导出
摘要 Key establishment and its management in Wireless Sensor Networks(WSN) is a challenging problem due to its limited resources and disordered structure. Many key management schemes have been developed recently for WSN to provide secure communication between source and destination sensor nodes.A serious threat highlighted in all of these schemes is that of node capture attacks,where an adversary gains full control over a sensor node through direct physical access.Node capture attacks can also be helpful to an adversary in new attacks like Blackhole and Denial of Service.All of these proposed key management solutions still suffer from node capture attacks with resilience.The current sensor networks are assumed to be designed for specific applications,having key management protocols strongly coupled to applications.The future sensor networks are envisioned as comprising heterogeneous devices assisting to a large range of applications.To achieve this goal,a new application independent approach is needed. In this paper we therefore present a novel,extended version of our previously published Dynamic Group-based Key Establishment(DGKE) protocol. We compare the proposed scheme with existing key management schemes,which shows a significant improvement in resilience against node capture attacks,memory overhead and connectivity. Key establishment and its management in Wireless Sensor Networks(WSN) is a challenging problem due to its limited resources and disordered structure. Many key management schemes have been developed recently for WSN to provide secure communication between source and destination sensor nodes.A serious threat highlighted in all of these schemes is that of node capture attacks,where an adversary gains full control over a sensor node through direct physical access.Node capture attacks can also be helpful to an adversary in new attacks like Blackhole and Denial of Service.All of these proposed key management solutions still suffer from node capture attacks with resilience.The current sensor networks are assumed to be designed for specific applications,having key management protocols strongly coupled to applications.The future sensor networks are envisioned as comprising heterogeneous devices assisting to a large range of applications.To achieve this goal,a new application independent approach is needed. In this paper we therefore present a novel,extended version of our previously published Dynamic Group-based Key Establishment(DGKE) protocol. We compare the proposed scheme with existing key management schemes,which shows a significant improvement in resilience against node capture attacks,memory overhead and connectivity.
出处 《China Communications》 SCIE CSCD 2007年第1期14-27,共14页 中国通信(英文版)
关键词 WIRELESS SENSOR NETWORK key management NODE CAPTURE ATTACKS WIRELESS SENSOR NETWORK security wireless sensor network key management node capture attacks wireless sensor network security
  • 相关文献

参考文献10

  • 1J.Leeand,D.R.Stinson.Deterministic key predistribution schemes for distributed sensornetworks[].Lecture Notes in Computer Science.2005
  • 2A. Becher,Z. Benenson,M. Dornseif."Tampering with motes: Real-world physical at-tacks on wireless sensor networks"[].rd Interna-tional Conference on Security in Pervasive Comput-ing (SPC).2006
  • 3Wenliang Du,Jing Deng,Yunghsiang S.Han,Pramod Varshney.A Key Pre-distribu-tion Scheme for Sensor Networks Using Deploy-ment Knowledge[].the IEEE Transactions on Dependable and Secure Computing.2005
  • 4Seyit A.amtepe,Bulent Yener.Key Distribution Mechanisms for Wireless Sensor Networks: a Survey[].TR-- Rensselaer Polytechnic Institute Computer Science Department.2005
  • 5Scott C -H. Huang,Maggie X. Cheng,Ding-Zhu Du."GeoSENS: geo-based sensor net-work secure communication protocol "[].Computer Communications.2005
  • 6Mathias Bohge,Wade Trappe."An Au-thentication Framework for Hierarchical Ad Hoc Sensor Networks"[].WiSe.
  • 7Donggang Liu,Peng Ning."Efficient Distri-bution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks,"[].Proceedings of the th Annual Network and Dis-tributed System Security Symposium.2003
  • 8Li Zhou,Jinfeng Ni,Chinya V. Ravishankar."Efficient Key Establishment for Group-Based Wireless Sen-sor Deployments"[].Wise.2005
  • 9Donggang Liu,Peng Ning,Wenliang Du."Group-Based Key Pre-Distribution in Wireless Sensor Networks,"[].Proceedings of ACM Workshop on Wireless Security (Wise ).2005
  • 10Jaemin Park,Zeen Kim,Kwan自o Kim."State-Based Key Management Scheme for Wire-less Sensor Networks"[].Proc of WSNS.2005

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部