DocumentCode
3339936
Title
An Efficient Authentication and Key Management Protocol for Hierarchical Ad Hoc Sensor Networks
Author
Fanian, Ali ; Berenjkoub, Mehdi ; Gulliver, T. Aaron
Author_Institution
Dept. of Electr. & Comput. Eng., Isfahan Univ. of Technol. (IUT), Isfahan
fYear
2009
fDate
5-8 April 2009
Firstpage
1
Lastpage
6
Abstract
Despite extensive research on flat ad hoc networks, meeting satisfactory security levels in sensor networks presents many problems. The main reason is that these networks are typically designed based on hierarchal structures. In this paper, we propose an efficient scheme for authentication and key management in hierarchical ad hoc sensor networks using symmetric polynomials. In the proposed method, the processing requirements and traffic load are proportional to the processing capability and required bandwidth in each layer. An ad hoc node at the lowest level of the hierarchy uses symmetric cryptography. With more processing capabilities, entities in higher layers use public key cryptography. Performance results show the superiority of the proposed method in comparison with previous approaches developed for hierarchical ad hoc sensor networks.
Keywords
ad hoc networks; cryptographic protocols; message authentication; polynomials; public key cryptography; telecommunication security; telecommunication traffic; wireless sensor networks; ad hoc sensor network; authentication; key management protocol; public key cryptography; symmetric polynomial; traffic load; Ad hoc networks; Authentication; Communications Society; Computer network management; Peer to peer computing; Polynomials; Protocols; Public key cryptography; Sensor phenomena and characterization; Wireless sensor networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Wireless Communications and Networking Conference, 2009. WCNC 2009. IEEE
Conference_Location
Budapest
ISSN
1525-3511
Print_ISBN
978-1-4244-2947-9
Electronic_ISBN
1525-3511
Type
conf
DOI
10.1109/WCNC.2009.4917570
Filename
4917570
Link To Document