Title :
A low-energy key management protocol for wireless sensor networks
Author :
G. Jolly;M.C. Kuscu;P. Kokate;M. Younis
Author_Institution :
Comput. Sci. & Electr. Eng., Maryland Univ., Baltimore, MD, USA
fDate :
6/25/1905 12:00:00 AM
Abstract :
Wireless sensor networks have a wide spectrum of civil and military applications that call for security, e.g., target surveillance in hostile environments. Typical sensors possess limited computation, energy, and memory resources; therefore the use of vastly resource-consuming security mechanisms is not possible. In this paper, we propose a cryptographic key management protocol, which is based on the IBSK scheme, but only two symmetric keys are required to be pre-deployed at each sensor. The protocol supports the eviction of the compromised nodes. Simulation shows that the key management is remarkably low thanks to the multi-tier network architecture in which only sensor-to-gateway secure sessions are allowed, and reports order-of-magnitude improvement in energy saving as compared to the original IBSK scheme, and Kerberos-like schemes.
Keywords :
"Wireless application protocol","Wireless sensor networks","Computer network management","Military computing","Application software","Energy consumption","Cryptographic protocols","Energy management","Hardware","Communication system security"
Conference_Titel :
Computers and Communication, 2003. (ISCC 2003). Proceedings. Eighth IEEE International Symposium on
Print_ISBN :
0-7695-1961-X
DOI :
10.1109/ISCC.2003.1214142