EDDK: Energy-Efficient Distributed Deterministic Key Management for Wireless Sensor Networks

被引:311
作者
Zhang, Xing [2 ]
He, Jingsha [1 ]
He, Qian [2 ]
机构
[1] Beijing Univ Technol, Sch Software Engn, Beijing 100124, Peoples R China
[2] Beijing Univ Technol, Coll Comp Sci & Technol, Beijing 100124, Peoples R China
关键词
PREDISTRIBUTION;
D O I
10.1155/2011/765143
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Energy efficiency is an essential requirement for wireless sensor networks while security must also be ensured for mission-critical applications. In this paper, we present an energy-efficient distributed deterministic key management scheme (EDDK) for resource-constrained wireless sensor networks. EDDK mainly focuses on the establishment and maintenance of the pairwise keys as well as the local cluster keys and can fix some flaws in some existing key management schemes. Not only can the neighbor table constructed during key establishment provide the security for key maintenance and data transfer, but it can also be used to effectively manage the storage and update of the keys. By using the elliptic curve digital signature algorithm in EDDK, both new and mobile sensor nodes can join or rejoin a sensor network securely. Unlike some centralized and location-based key management schemes, EDDK does not depend on such infrastructure as base stations and robots and thus has a high level of flexibility. Experiments and analyses show that EDDK has a very low overhead in terms of computation, communication, and storage.
引用
收藏
页数:11
相关论文
共 29 条
[1]  
[Anonymous], 2002, IEEE WORKSHOP LARGE
[2]  
[Anonymous], 2004, P 6 INT WORKSH CRYPT
[3]  
BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
[4]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[5]   A practical study of transitory master key establishment for wireless sensor networks [J].
Deng, J ;
Hartung, C ;
Han, R ;
Mishra, S .
First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, :289-299
[6]   LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks [J].
Di Pietro, R ;
Mancini, LV ;
Law, YW ;
Etalle, S ;
Havinga, P .
2003 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING WORKSHOPS, PROCEEDINGS, 2003, :397-406
[7]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[8]  
Donggang Liu, 2005, ACM Transactions on Information and Systems Security, V8, P41, DOI 10.1145/1053283.1053287
[9]  
Du W., 2005, ACM Transactions on Information and Systems Security, V8, P228, DOI 10.1145/1065545.1065548
[10]  
DU W, 2005, P 6 ACM INT S MOB AD, P58