Selecting key management schemes for WSN applications

被引:31
作者
Alcaraz, Cristina [1 ]
Lopez, Javier [1 ]
Roman, Rodrigo [2 ]
Chen, Hsiao-Hwa [3 ]
机构
[1] Univ Malaga, Dept Comp Sci, Campus Teatinos S-N, E-29071 Malaga, Spain
[2] Inst Infocomm Res, Singapore 138632, Singapore
[3] Natl Cheng Kung Univ, Dept Engn Sci, Tainan 70101, Taiwan
关键词
Sensor networks; Key management; Network design; Optimization; Security; SENSOR; ESTABLISHMENT;
D O I
10.1016/j.cose.2012.07.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Key management in wireless sensor networks (WSN) is an active research topic. Due to the fact that a large number of key management schemes (KMS) have been proposed in the literature, it is not easy for a sensor network designer to know exactly which KMS best fits in a particular WSN application. In this article, we offer a comprehensive review on how the application requirements and the properties of various key management schemes influence each other. Based on this review, we show that the KMS plays a critical role in determining the security performance of a WSN network with given application requirements. We also develop a method that allows the network designers to select the most suitable KMS for a specific WSN network setting. In addition, the article also addresses the issues on the current state-of-the-art research on the KMS for homogeneous (i.e. non-hierarchical) networks to provide solutions for establishing link-layer keys in various WSN applications and scenarios. (C) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:956 / 966
页数:11
相关论文
共 32 条
[1]  
Alcaraz C, 2012, 6 IFIP WG 11 10 INT
[2]   A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems [J].
Alcaraz, Cristina ;
Lopez, Javier .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2010, 40 (04) :419-428
[3]   Key infection: Smart trust for smart dust [J].
Anderson, R ;
Chan, HW ;
Perrig, A .
12TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS - PROCEEDINGS, 2004, :206-215
[4]  
[Anonymous], ISA10011A2009
[5]  
Bradley R, 2012, INT J INF SECUR, V11, P1
[6]   Combinatorial design of key distribution mechanisms for wireless sensor networks [J].
Camtepe, Seyit A. ;
Yener, Bulent .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2007, 15 (02) :346-358
[7]  
Çamtepe SA, 2008, CRYPTOL INF SEC SER, V1, P110
[8]  
Chan HW, 2005, IEEE INFOCOM SER, P524
[9]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[10]   A light-weight authentication scheme for wireless sensor networks [J].
Delgado-Mohatar, Oscar ;
Fuster-Sabater, Amparo ;
Sierra, Jose M. .
AD HOC NETWORKS, 2011, 9 (05) :727-735