Key management issues in wireless sensor networks: Current proposals and future developments

被引:33
作者
Lee, Johnson C. [1 ]
Leung, Victor C. M. [1 ]
Wong, Kirk H. [1 ]
Cao, Jiannong [1 ]
Chan, Henry C. B. [1 ]
机构
[1] Hong Kong Polytech Univ, Dept Comp, Kowloon, Hong Kong, Peoples R China
关键词
D O I
10.1109/MWC.2007.4396946
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Key management has remained a challenging issue in wireless sensor networks (WSNs) due to the constraints of sensor node resources. Various key management schemes that trade off security and operational requirements have been proposed in recent years. In this article, we first examine the security and operational requirements of WSNs and then review five key management protocols: Eschenauer, Du, LEAP, SHELL, and Panja. Eschenauer's scheme is a classical random key distribution scheme for WSNs. Du's scheme improves on Eschenauer's scheme by using key matrices. LEAP provides a highly flexible key management scheme using four types of keys. SHELL focuses on achieving high robustness, and Panja is optimized for hierarchical WSNs. LEAP, SHELL, and Panja support cluster-based operations and are more aligned with current trends as shown by the new standards, IEEE 802.15.4b and the ZigBee "enhanced" standard. Future developments likely will incorporate,the features of LEAP and adjustable robustness enhancements from Eschenauer or Du; extremely security-critical applications may benefit from restructuring SHELL to ease implementation and maintenance. Developments for extremely large WSNs should consider improving Panja's scheme due to its hierarchical scalability feature.
引用
收藏
页码:76 / 84
页数:9
相关论文
共 10 条
[1]  
BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
[2]  
CAMTEPE SA, 2005, TR0507 RENSS POL DEP
[3]  
Carman D.W., 2000, 00010 NAI
[4]  
Du W, 2003, P 10 ACM C COMP COMM, P42, DOI [10.1145/948109.948118, DOI 10.1145/948109.948118]
[5]  
Eschenauer L., 2002, Proceedings of the ACM Conference on Computer and Communications Security, P41, DOI [10.1145/586110.586117, DOI 10.1145/586110.586117]
[6]  
Panja B, 2006, IEEE INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, UBIQUITOUS, AND TRUSTWORTHY COMPUTING, VOL 1, PROCEEDINGS, P384
[7]   SPINS: Security protocols for sensor networks [J].
Perrig, A ;
Szewczyk, R ;
Tygar, JD ;
Wen, V ;
Culler, DE .
WIRELESS NETWORKS, 2002, 8 (05) :521-534
[8]  
Sastry N., 2004, P 3 ACM WORKSH WIR S, P32, DOI DOI 10.1145/1023646.1023654
[9]   Location-aware combinatorial key management scheme for clustered sensor networks [J].
Younis, Mohamed F. ;
Ghumman, Kajaldeep ;
Eltoweissy, Mohamed .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2006, 17 (08) :865-882
[10]  
Zhu S., 2003, Proceedings of the 10th ACM conference on Computer and communications security, CCS '03, P62, DOI DOI 10.1145/948109.948120