Key re-establishment protocols in hierarchical wireless sensor networks

An Ni Shen, Song Guo

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

Abstract

Many applications of wireless sensor network require secure data communications, especially in a hostile environment. In order to protect the sensitive data and the sensor readings, secret keys should be used to encrypt the exchanged messages between communicating nodes. Traditional asymmetric key cryptosystems are infeasible in WSN due to its low capacity at each senor node. In this paper, we propose a new key distribution scheme for hierarchical WSNs with renewable network devices. Compared to some of the existing schemes, our methods possess the following features that are particularly beneficial to the resource-constrained large-scale WSNs: (1) robustness to the node capture attack, (2) flexibility on key establishment for adding new network devices, (3) scalability in terms of storage cost, and (4) low communication overhead.
Original languageEnglish
Title of host publication2009 European Wireless Conference, EW 2009
Pages184-188
Number of pages5
DOIs
Publication statusPublished - 1 Dec 2009
Externally publishedYes
Event2009 European Wireless Conference, EW 2009 - Aalborg, Denmark
Duration: 17 May 200920 May 2009

Conference

Conference2009 European Wireless Conference, EW 2009
Country/TerritoryDenmark
CityAalborg
Period17/05/0920/05/09

Keywords

  • Hierarchical wireless sensor network
  • Key management
  • Pair-wise key
  • Security

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Communication

Fingerprint

Dive into the research topics of 'Key re-establishment protocols in hierarchical wireless sensor networks'. Together they form a unique fingerprint.

Cite this