Title :
UBKM: A Usage-Based Key Management Protocol for Distributed Sensor Networks
Author :
Baojiang Cui ; Ziyue Wang ; Tao Guo ; Guowei Dong ; Bing Zhao
Author_Institution :
Sch. of Comput., Beijing Univ. of Posts & Telecommun., Beijing, China
Abstract :
Due to the growing number of applications of wireless sensor networks in recent years, it´s necessary to protect wireless sensor networks from various attacks. Making use of key management is an effective and important way to achieve such goal. Since different types of messages exchanged between sensor nodes have different security requirements and there may be special demand in the network, a single keying mechanism is not suitable for meeting all of them. According to the above, in this paper, a Usage-based key management protocol (UBKM) is described for sensor networks that based on four kinds of keys which can be derived from an initial master key. It´s designed to restrict the security impact of a captured node to the rest network. In addition, UBKM meets the requirement of energy efficiency by supporting in-network process. The master key protection and key revocation mechanisms are discussed in this paper as well as the authentication mechanism based on the use of one-way hash function. Finally, the consumption and performance of UBKM is analyzed and its security and efficiency in protecting the sensor network is shown. In this paper, promising research directions are mentioned which can be a focus of future research.
Keywords :
cryptographic protocols; energy conservation; message authentication; performance evaluation; telecommunication power management; telecommunication security; wireless sensor networks; UBKM performance; UBKM protocol; authentication mechanism; distributed sensor networks; energy efficiency; in-network process; key revocation mechanisms; master key protection; message exchange; one-way hash function; security requirements; sensor nodes; usage-based key management protocol; wireless sensor networks; Authentication; Base stations; Encryption; Protocols; Wireless sensor networks; Key erasure; broadcast authentication; key management; sensor networks;
Conference_Titel :
Emerging Intelligent Data and Web Technologies (EIDWT), 2013 Fourth International Conference on
Conference_Location :
Xi´an
Print_ISBN :
978-1-4799-2140-9
DOI :
10.1109/EIDWT.2013.51