Title :
Location dependent key management in sensor networks without using deployment knowledge
Author_Institution :
Telcordia Technol., Piscataway, NJ, USA
Abstract :
In this paper we propose an approach for key management in sensor networks which takes the location of sensor nodes into consideration while deciding the keys to be deployed on each node. As a result, this approach not only reduces the number of keys that have to be stored on each sensor node but also provides for the containment of node compromise. Thus compromise of a node in a location affects the communications only around that location. This approach which we call as location dependent key management does not require any knowledge about the deployment of sensor nodes. The proposed scheme starts off with loading a single key on each sensor node prior to deployment. The actual keys are then derived from this single key once the sensor nodes are deployed. The proposed scheme allows for additions of sensor nodes to the network at any point in time. We study the proposed scheme using both analysis and simulations and point out the advantages.
Keywords :
cryptography; wireless sensor networks; deployment knowledge; location dependent key management; sensor networks; Analytical models; Batteries; Costs; Knowledge management; Proposals; Public key cryptography; Sensor phenomena and characterization; Target tracking; Technology management; Wireless sensor networks;
Conference_Titel :
Communication Systems Software and Middleware, 2007. COMSWARE 2007. 2nd International Conference on
Conference_Location :
Bangalore
Print_ISBN :
1-4244-0613-7
DOI :
10.1109/COMSWA.2007.382602