Title :
Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks
Author :
Du, Xiaojiang ; Guizani, Mohsen ; Xiao, Yang ; Chen, Hsiao-Hwa
Author_Institution :
Dept. of Comput. Sci., North Dakota State Univ., Fargo, ND
fDate :
3/1/2009 12:00:00 AM
Abstract :
Previous research on sensor network security mainly considers homogeneous sensor networks, where all sensor nodes have the same capabilities. Research has shown that homogeneous ad hoc networks have poor performance and scalability. The many-to-one traffic pattern dominates in sensor networks, and hence a sensor may only communicate with a small portion of its neighbors. Key management is a fundamental security operation. Most existing key management schemes try to establish shared keys for all pairs of neighbor sensors, no matter whether these nodes communicate with each other or not, and this causes large overhead. In this paper, we adopt a Heterogeneous Sensor Network (HSN) model for better performance and security. We propose a novel routing-driven key management scheme, which only establishes shared keys for neighbor sensors that communicate with each other. We utilize Elliptic Curve Cryptography in the design of an efficient key management scheme for sensor nodes. The performance evaluation and security analysis show that our key management scheme can provide better security with significant reductions on communication overhead, storage space and energy consumption than other key management schemes.
Keywords :
public key cryptography; telecommunication network management; telecommunication network routing; telecommunication security; telecommunication traffic; wireless sensor networks; heterogeneous sensor network security; key management scheme; many-to-one traffic pattern; routing-driven elliptic curve cryptography; Ad hoc networks; Elliptic curve cryptography; Energy consumption; Energy management; Energy storage; Performance analysis; Scalability; Secure storage; Security; Telecommunication traffic; Security; elliptic curve cryptography; key management; sensor networks;
Journal_Title :
Wireless Communications, IEEE Transactions on
DOI :
10.1109/TWC.2009.060598