• DocumentCode
    476325
  • Title

    A Misused Key Detection Mechanism for Hierarchical Routings in Wireless Sensor Network

  • Author

    Park, Min-Woo ; Kim, Jong-Myoung ; Han, Young-Ju ; Chung, Tai-Myoung

  • Author_Institution
    Dept. of Electr. & Comput. Eng., Sungkyunkwan Univ., Suwon
  • Volume
    1
  • fYear
    2008
  • fDate
    2-4 Sept. 2008
  • Firstpage
    47
  • Lastpage
    52
  • Abstract
    Wireless sensor networks are generally deployed in hostile environment so the security service is the essential part of wireless sensor networks. To achieve the security service, key management is the fundamental one. Many key management schemes have been proposed considering the characteristics of sensor nodes. Despite the advances of key management techniques, wireless sensor networks still have vulnerable point. An attacker can easily compromise sensor nodes, and gets some keys from the compromised sensor nodes. These exposed keys may be used by the attacker to forge and modify messages between non-compromised nodes, and the attackers can mislead the application of wireless sensor networks. Recently, Liu and Dong introduced a scheme for detecting misused keys between non-compromised nodes. The performance of detecting a misused key is not bad in their scheme. However, the performance of power consumption is bad in hierarchical routings, because some additional message overheads are occurred at the receiving node and these overheads may be concentrated on only one node called cluster head. In this paper, we propose a misused key detection scheme for hierarchical routings. Our scheme reduces the overhead at the cluster node by decreasing a number of messages for detecting misused key. In our scheme, The misused key detection is performed at the cluster node so the additional messages are not needed any more.
  • Keywords
    telecommunication network management; telecommunication network routing; wireless sensor networks; cluster head; hierarchical routings; hostile environment; key management schemes; misused key detection mechanism; security service; wireless sensor network; Base stations; Computer network management; Computer networks; Conference management; IP networks; Information management; Routing; Sensor phenomena and characterization; Web and internet services; Wireless sensor networks; Sensor network; misused key;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Networked Computing and Advanced Information Management, 2008. NCM '08. Fourth International Conference on
  • Conference_Location
    Gyeongju
  • Print_ISBN
    978-0-7695-3322-3
  • Type

    conf

  • DOI
    10.1109/NCM.2008.124
  • Filename
    4623976