Title :
Post Deployment Encryption Key Generation for a Fully Connected and Secure Wireless Sensor Network
Author :
Saif Ur, Rehman ; Gang Cui ; Jianmin Bao
Author_Institution :
Sch. of Comput. Sci. & Technol., Harbin Inst. of Technol., Harbin, China
Abstract :
In Wireless Senor Networks the use of multiple encryption keys is adopted to provide resilience against compromised encryption keys. The keys are either pre distributed or generated post deployment. Key pre distribution causes redundancy and limits scalability and link establishment. Key generation via computation requires processor intensive operations and the network might still be prone to serious consequences after a node is captured or compromised. This paper presents a key generation technique that can eliminate redundancy and key reuse, ensure link establishment, and subsequent scalability. The proposed technique provides resilience in the event of compromised nodes by localizing the impact on the network and inherently thwarts some attacks.
Keywords :
public key cryptography; radio links; redundancy; sensor placement; telecommunication security; wireless sensor networks; attack thwartning; fully connected wireless senor network link security; post deployment multiple encryption key generation; predistributed encryption key resilience; processor intensive operation; public key reuse elimination algorithm; redundancy elimination; Encryption; Public key; Scalability; Sensors; Wireless sensor networks; Encryption; Scalability; Security; Wireless Sensor Networks; key management schemes;
Conference_Titel :
Dependable, Autonomic and Secure Computing (DASC), 2014 IEEE 12th International Conference on
Conference_Location :
Dalian
Print_ISBN :
978-1-4799-5078-2
DOI :
10.1109/DASC.2014.87