Reducing radio energy consumption of key management protocols for wireless sensor networks

被引:34
作者
Lai, BCC [1 ]
Hwang, DD [1 ]
Kim, SP [1 ]
Verbauwhede, I [1 ]
机构
[1] Univ Calif Los Angeles, Dept Elect Engn, Los Angeles, CA 90024 USA
来源
ISLPED '04: PROCEEDINGS OF THE 2004 INTERNATIONAL SYMPOSIUM ON LOW POWER ELECTRONICS AND DESIGN | 2004年
关键词
sensor network; key management protocol;
D O I
10.1145/1013235.1013320
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The security of sensor networks is a challenging area. Key management is one of the crucial parts in constructing the security among sensor nodes. However, key management protocols require a great deal of energy consumption, particularly in the transmission of initial key negotiation messages. In this paper, we examine three previously published sensor network security schemes: SPINS and C&R for master-key-based schemes, and Eschenhaur-Gligor (EG) for distributed-key-based schemes. We then present two new low-power schemes, which we call BROSK and OKS as alternatives to master-key-based schemes and distributed-key-based schemes, respectively. Compared to SPINS and C&R protocols, BROSK can reduce energy consumption by up to 12X by reducing the number of data transmissions in the key negotiation process. Compared with EG, OKS reduces energy by up to 96% and reduces memory requirements by up to 78%.
引用
收藏
页码:351 / 356
页数:6
相关论文
共 11 条
[1]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[2]  
[Anonymous], STRANGE LOGIC RANDOM
[3]  
[Anonymous], P ACM SIGCOMM WORKSH
[4]  
CARMAN DW, 2000, 00010 NAI LABS
[5]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[6]  
Edwards W Keith, 2001, INT C UB COMP, P256, DOI DOI 10.1007/3-540-45427-6
[7]  
Eschenauer L., 2002, Proceedings of the ACM Conference on Computer and Communications Security, P41, DOI [10.1145/586110.586117, DOI 10.1145/586110.586117]
[8]  
KIDD CD, 1999, P COBUILD OCT
[9]  
Menezes A. J, 1997, HDB APPL CRYPTOGRAPH
[10]   SPINS: Security protocols for sensor networks [J].
Perrig, A ;
Szewczyk, R ;
Tygar, JD ;
Wen, V ;
Culler, DE .
WIRELESS NETWORKS, 2002, 8 (05) :521-534