DocumentCode :
658774
Title :
Hierarchical Key Negotiation Technique for Transitory Master Key Schemes in Wireless Sensor Networks
Author :
Celozzi, Cesare ; Gandino, F. ; Rebaudengo, Maurizio
Author_Institution :
Dipt. di Autom. e Inf., Politec. di Torino, Torino, Italy
fYear :
2013
fDate :
28-30 Oct. 2013
Firstpage :
151
Lastpage :
157
Abstract :
Wireless sensor networks have been applied in various contexts where hardware and network data are exposed to security threats, such as tampering or eavesdropping. The majority of the security approaches adopted in this context are based on symmetric encryption, which requires keys shared among the nodes. Many key management schemes, like the transitory master key scheme LEAP+, have been proposed for the negotiation of keys. In this paper a new key negotiation technique suitable for LEAP+ protocol is described. The roposed protocol significantly reduces the time of exposition of sensitive information through a new organization of handshake operations and of key establishment. A comparison with the original version of LEAP+ was performed to evaluate the improvements achieved by the proposed approach.
Keywords :
cryptographic protocols; wireless sensor networks; LEAP+ protocol; handshake operations; hierarchical key negotiation technique; key management schemes; security threats; sensitive information; symmetric encryption; transitory master key schemes; wireless sensor networks; Authentication; Communication system security; Cryptography; Protocols; Wireless communication; Wireless sensor networks; key management; transitory master key; wireless sensor networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Broadband and Wireless Computing, Communication and Applications (BWCCA), 2013 Eighth International Conference on
Conference_Location :
Compiegne
Type :
conf
DOI :
10.1109/BWCCA.2013.33
Filename :
6690879
Link To Document :
بازگشت