Hierarchical Key Negotiation Technique for Transitory Master Key Schemes in Wireless Sensor Networks

被引:1
作者
Celozzi, Cesare [1 ]
Gandino, Filippo [1 ]
Rebaudengo, Maurizio [1 ]
机构
[1] Politecn Torino, Dipartimento Automat & Informat, I-10129 Turin, Italy
来源
2013 EIGHTH INTERNATIONAL CONFERENCE ON BROADBAND, WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2013) | 2013年
关键词
key management; wireless sensor networks; transitory master key; SYSTEM;
D O I
10.1109/BWCCA.2013.33
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless sensor networks have been applied in various contexts where hardware and network data are exposed to security threats, such as tampering or eavesdropping. The majority of the security approaches adopted in this context are based on symmetric encryption, which requires keys shared among the nodes. Many key management schemes, like the transitory master key scheme LEAP+, have been proposed for the negotiation of keys. In this paper a new key negotiation technique suitable for LEAP+ protocol is described. The proposed protocol significantly reduces the time of exposition of sensitive information through a new organization of handshake operations and of key establishment. A comparison with the original version of LEAP+ was performed to evaluate the improvements achieved by the proposed approach.
引用
收藏
页码:151 / 157
页数:7
相关论文
共 19 条
  • [1] Wireless sensor networks for healthcare: A survey
    Alemdar, Hande
    Ersoy, Cem
    [J]. COMPUTER NETWORKS, 2010, 54 (15) : 2688 - 2710
  • [2] Bekmezci I., 2009, Wireless Sensor Networks: A Military Monitoring Application
  • [3] Bhattacharya S, 2012, I CONF SENS TECHNOL, P422, DOI 10.1109/ICSensT.2012.6461713
  • [4] Celozzi C., 2013, 4 INT C SEN IN PRESS
  • [5] Chae Hoon Lim, 2008, 2008 28th International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P376, DOI 10.1109/ICDCS.Workshops.2008.93
  • [6] Random key predistribution schemes for sensor networks
    Chan, HW
    Perrig, A
    Song, D
    [J]. 2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 197 - 213
  • [7] A practical study of transitory master key establishment for wireless sensor networks
    Deng, J
    Hartung, C
    Han, R
    Mishra, S
    [J]. First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, : 289 - 299
  • [8] Dong-Min Choi, 2010, Proceedings of the 2010 IEEE 12th International Conference on High Performance Computing and Communications (HPCC 2010), P497, DOI 10.1109/HPCC.2010.52
  • [9] Eschenauer L., 2002, ACM CCS2002, DOI DOI 10.1145/586110.586117
  • [10] Fu-Ren Lin, 2011, 2011 International Joint Conference on Service Sciences (IJCSS), P218, DOI 10.1109/IJCSS.2011.50