Key management scheme using time-based deployment for wireless sensor networks

被引:3
作者
Yuan T. [1 ]
Ma J.-Q. [1 ]
Zhong Y.-P. [1 ]
Zhang S.-Y. [1 ]
机构
[1] School of Computer Science, Fudan University
来源
Ruan Jian Xue Bao/Journal of Software | 2010年 / 21卷 / 03期
关键词
Key management; Network security; Random key predistribution; Time-based deployment; Wireless sensor network;
D O I
10.3724/SP.J.1001.2010.03457
中图分类号
学科分类号
摘要
This paper proposes a key management scheme using time-based deployment for wireless sensor networks, which is characterized by a special two-tier random key pre-distribution and elimination mechanism as well as a time-based group deployment method. Each sensor node randomly chooses keys from multiple key pools and deletes related keys when certain conditions are satisfied; All the sensor nodes are organized into deployment groups and are chronologically deployed into the network. Compared with classical key management schemes for wireless sensor networks, The proposed scheme increases node resource efficiency and enhances network resilience against node compromise while ensuring a relatively high node connectivity for pair-wise key generation. © by Institute of Software, the Chinese Academy of Sciences. All rights reserved.
引用
收藏
页码:516 / 527
页数:11
相关论文
共 20 条
[1]  
Akyildiz I.F., Su W., Sankarasubramaniam Y., Cayirci E., A survey on sensor networks, IEEE Communications Magazine, 40, 8, pp. 102-114, (2002)
[2]  
Su Z., Lin C., Feng F.J., Ren F.Y., Key management schemes and protocols for wireless sensor networks, Journal of Software, 18, 5, pp. 1218-1231, (2007)
[3]  
Product feature reference: Sensors and functions
[4]  
Diffie W., Hellman M.E., New directions in cryptography, IEEE Trans. on Information Theory, 22, 6, pp. 644-654, (1976)
[5]  
Rivest R.L., Shamir A., Adleman L.M., A method for obtaining digital signatures and public key cryptosystems, Communications of the ACM, 21, 2, pp. 120-126, (1978)
[6]  
Neuman B.C., Tso T., Kerberos: An authentication service for computer networks, IEEE Communications Magazine, 32, 9, pp. 33-38, (1994)
[7]  
Anjum F., Mouchtaris P., Security for Wireless Ad Hoc Networks, (2007)
[8]  
Eschenauer L., Gligor V.D., A key-management scheme for distributed sensor networks, Proc. of the 9th ACM Conf. on Computer and Communications Security, pp. 41-47, (2002)
[9]  
Chan H., Perrig A., Song D., Random key predistribution schemes for sensor networks, Proc. of the IEEE Symp. on Security and Privacy, pp. 197-213, (2003)
[10]  
Du W., Deng J., Han Y.S., Varshney P.K., A pairwise key pre-distribution scheme for wireless sensor networks, Proc. of the 10th ACM Conf. on Computer and Communications Security, pp. 42-51, (2003)