A secure key agreement scheme in low-energy wireless sensor networks

被引:0
作者
Kim, Taeyeon [1 ]
Wang, Gicheol
Cho, Gihwan
机构
[1] Seonam Univ, Dept Comp Sci & Informat Commun, Namwon 590711, Joenbuk, South Korea
[2] Chonbuk Natl Univ, CAIIT, Div EIE, Jeonju 561756, South Korea
来源
EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS | 2006年 / 4096卷
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Ubiquitous computing environment provides users with information access anytime and anywhere. In particular, sensor networks must be broadly deployed in real world and utilized to ensure the safety of the human life. In cryptography aspect, key agreement protocol is very important element to exchange messages safely between sensor nodes. This concern originates from the fact that sensor nodes are highly vulnerable to faults, energy depletions, and security attacks. The open problems are how to verify the identity of communicating nodes, how to set up a session key between communicating nodes, and how to minimize any information about the keys disclosed to the other side of key agreement. To solve above problems, we propose a secure key agreement scheme for low-energy sensor networks. Our scheme is based on the MRS scheme and enhances the security by hiding unshared keys and the number of shared keys. Besides, it resolves the weak points in encryption mechanism of MRS by employing multiple random numbers. Performance and security analyses have proven that our scheme is suitable for sensor networks in terms of availability and security aspects.
引用
收藏
页码:79 / 88
页数:10
相关论文
共 7 条
[1]   Energy efficient security protocol for wireless sensor networks [J].
Çam, H ;
Özdemir, S ;
Muthuavinashiappan, D ;
Nair-, P .
2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, :2981-2984
[2]  
Chan ACF, 2004, IEEE INFOCOM SER, P2414
[3]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[4]  
Du W, 2003, P 10 ACM C COMP COMM, P42, DOI [10.1145/948109.948118, DOI 10.1145/948109.948118]
[5]  
Du WL, 2004, IEEE INFOCOM SER, P586
[6]  
Eschenauer L., 2002, Proceedings of the ACM Conference on Computer and Communications Security, P41, DOI [10.1145/586110.586117, DOI 10.1145/586110.586117]
[7]  
Rivest Ronald L, 1978, Foundations of Secure Computation, V4, P169