A kind of dynamic key management method for sensor networks

Author(s):  
Ying Zhang ◽  
Pengfei Ji
2014 ◽  
Vol 998-999 ◽  
pp. 1092-1095
Author(s):  
Qi Sheng Zhao ◽  
Xiao Ming Liu ◽  
Hui Sheng Zhu

The information security of wireless sensor networks is one of hot issues on the current research; this paper combines threshold key scheme with the management of security key sharing and group agreement and proposes dynamic key management scheme through clustering level key matrix of authentication mechanism from the cluster to node. The network is divided into different clusters, and the cluster head conducts the key authentication exchange and updates the key management with threshold key schemes, with no need of third authentication center, reduces the computing and communication costs, and promotes communication.


2015 ◽  
Vol 2015 ◽  
pp. 1-10
Author(s):  
Chin-Ling Chen ◽  
Chih-Cheng Chen ◽  
De-Kui Li

In recent years, wireless sensor network (WSN) applications have tended to transmit data hop by hop, from sensor nodes through cluster nodes to the base station. As a result, users must collect data from the base station. This study considers two different applications: hop by hop transmission of data from cluster nodes to the base station and the direct access to cluster nodes data by mobile users via mobile devices. Due to the hardware limitations of WSNs, some low-cost operations such as symmetric cryptographic algorithms and hash functions are used to implement a dynamic key management. The session key can be updated to prevent threats of attack from each communication. With these methods, the data gathered in wireless sensor networks can be more securely communicated. Moreover, the proposed scheme is analyzed and compared with related schemes. In addition, an NS2 simulation is developed in which the experimental results show that the designed communication protocol is workable.


2006 ◽  
Vol 44 (4) ◽  
pp. 122-130 ◽  
Author(s):  
M. Eltoweissy ◽  
M. Moharrum ◽  
R. Mukkamala

Author(s):  
Biswajit Panja ◽  
Sanjay Kumar Madria

In sensor networks, the large numbers of tiny sensor nodes communicate remotely or locally among themselves to accomplish a wide range of applications. However, such a network poses serious security protocol design challenges due to ad hoc nature of the communication and the presence of constraints such as limited energy, slower processor speed and small memory size. To secure such a wireless network, the efficient key management techniques are important as existing techniques from mobile ad hoc networks assume resource-equipped nodes. There are some recent security protocols that have been proposed for sensor networks and some of them have also been implemented in a real environment. This chapter provides an overview of research in the area of key management for sensor networks mainly focused on using a cluster head based architecture. First we provide a review of the existing security protocols based on private/public key cryptography, Kerberos, Digital signatures and IP security. Next, the authors investigate some of the existing work on key management protocols for sensor networks along with their advantages and disadvantages. Finally, some new approaches for providing key management, cluster head security and dynamic key computations are explored.


Sign in / Sign up

Export Citation Format

Share Document