oalib
Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Distributed KDC-Based Random Pairwise Key Establishment in Wireless Sensor Networks  [cached]
Su Zhong,Jiang Yixin,Ren Fengyuan,Lin Chuang
EURASIP Journal on Wireless Communications and Networking , 2010,
Abstract: Key management is a core mechanism to provide secure and reliable communications in wireless sensor networks (WSNs). In large-scale WSNs, due to the resource constraint on sensor nodes, it is still an extremely challenging task to achieve good performance in terms of high network connectivity and strong resilience against sensor nodes capture with low overheads. To address this issue, in this paper we propose a novel random pairwise key establishment scheme, called RPKE. In RPKE, sensor nodes differentiate their roles as either auxiliary nodes or ordinary nodes prior to network deployment. The auxiliary nodes act as distributed key distribution center (KDC), and neighboring ordinary nodes can establish pairwise key with the help of the distributed KDC. Theoretical analysis and simulation evaluation demonstrate that RPKE performs well in terms of network connectivity and resilience at the cost of low computation/communication/storage overheads, compared to the existing counterparts.
Hierarchical Grid-Based Pairwise Key Pre-distribution in Wireless Sensor Networks  [PDF]
Abedelaziz Mohaisen,DaeHun Nyang,KyungHee Lee
Computer Science , 2008,
Abstract: The security of wireless sensor networks is an active topic of research where both symmetric and asymmetric key cryptography issues have been studied. Due to their computational feasibility on typical sensor nodes, symmetric key algorithms that use the same key to encrypt and decrypt messages have been intensively studied and perfectly deployed in such environment. Because of the wireless sensor's limited infrastructure, the bottleneck challenge for deploying these algorithms is the key distribution. For the same reason of resources restriction, key distribution mechanisms which are used in traditional wireless networks are not efficient for sensor networks. To overcome the key distribution problem, several key pre-distribution algorithms and techniques that assign keys or keying material for the networks nodes in an offline phase have been introduced recently. In this paper, we introduce a supplemental distribution technique based on the communication pattern and deployment knowledge modeling. Our technique is based on the hierarchical grid deployment. For granting a proportional security level with number of dependent sensors, we use different polynomials in different orders with different weights. In seek of our proposed work's value, we provide a detailed analysis on the used resources, resulting security, resiliency, and connectivity compared with other related works.
Hierarchical Grid-based Pairwise Key Pre-distribution in Wireless Sensor Networks  [cached]
Abedelaziz Mohaisen,DaeHun Nyang,KyungHee Lee
International Journal of Network Security , 2009,
Abstract: The security of wireless sensor networks is an active topic of research where both symmetric and asymmetric key cryptography issues have been studied. Due to their computational feasibility on typical sensor nodes, symmetric key algorithms that use the same key to encrypt and decrypt messages have been intensively studied and perfectly deployed in such environment. Because of the wireless sensor's limited infrastructure, the bottleneck challenge for deploying these algorithms is the key distribution. For the same reason of resources restriction, key distribution mechanisms which are used in traditional wireless networks are not efficient for sensor networks.
Research of pairwise key establishment protocol in sensor networks
传感器网络中对偶密钥建立协议研究

LI Ping,WU Jia-ying,
李平
,吴佳英

计算机应用 , 2008,
Abstract: A number of isolated key-sharing component would be available in wireless sensor networks, due to random deployment of sensor nodes. In order to solve this problem, multi-nodes trust model based on trust relationship transfer was presented, along with the corresponding results key establishment protocol based on authentication in trust field. Simulation show that the presented protocol can achieve interconnection of components effectively, as well as nice performance on resilience of sensor nodes in the network. Thus, the security and effectiveness of the protocol are verified.
Cross Layer Implementation of Key Establishment and Configuration Protocols in WSN
Ozgur Saglam,Mehmet Emin Dalkilic
International Journal of Computer Science Issues , 2011,
Abstract: Security in Wireless Sensor Networks (WSN) can be achieved by establishing shared keys among the neighbor sensor nodes to create secure communication links. The protocol to be used for such a pairwise key establishment is a key factor determining the energy to be consumed by each sensor node during the secure network configuration. On the other hand, to achieve the optimum network configuration, nodes may not need to establish pairwise keys with all of their neighbors. Because, links to be established are defined by the network configuration protocol and as long as the network connectivity requirements are satisfied, number of links to be secured can be limited accordingly. In this sense, key establishment and network configuration performances are related to each other and this cross relation should be taken into consideration while implementing security for WSN. In this paper, we have investigated the cross layer relations and performance figures of the selected randomized pre-distribution and public key based key establishment protocols with the configuration protocol we proposed in a separate publication. Simulation results indicate that total network configuration energy cost can be reduced by reducing the number of links to be secured without affecting the global network connectivity performance. Results also show that the energy and resilience performances of the public key establishment can be better than the key pre-distribution for a given set of network configuration parameters.
Cross Layer Implementation of Key Establishment and Configuration Protocols in WSN  [PDF]
?zgür Sa?lam,Mehmet Emin Dalkili?
Computer Science , 2011,
Abstract: Security in Wireless Sensor Networks (WSN) can be achieved by establishing shared keys among the neighbor sensor nodes to create secure communication links. The protocol to be used for such a pairwise key establishment is a key factor determining the energy to be consumed by each sensor node during the secure network configuration. On the other hand, to achieve the optimum network configuration, nodes may not need to establish pairwise keys with all of their neighbors. Because, links to be established are defined by the network configuration protocol and as long as the network connectivity requirements are satisfied, number of links to be secured can be limited accordingly. In this sense, key establishment and network configuration performances are related to each other and this cross relation should be taken into consideration while implementing security for WSN. In this paper, we have investigated the cross layer relations and performance figures of the selected randomized pre-distribution and public key based key establishment protocols with the configuration protocol we proposed in a separate publication. Simulation results indicate that total network configuration energy cost can be reduced by reducing the number of links to be secured without affecting the global network connectivity performance. Results also show that the energy and resilience performances of the public key establishment can be better than the key pre-distribution for a given set of network configuration parameters.
A Location-Adaptive Key Establishment Scheme for Large-Scale Distributed Wireless Sensor Networks  [cached]
Ashok Kumar Das
Journal of Computers , 2009, DOI: 10.4304/jcp.4.9.896-904
Abstract: The establishment of pairwise keys between communicating neighbor nodes in sensor networks is a challenging problem due to the unsuitability of public-key cryptographic techniques for the resource-constrained platforms of sensor networks and also due to vulnerability of physical captures of sensor nodes by an adversary/enemy. In this paper, we propose a new location-adaptive key establishment scheme which is considered as an improved alternative to the path key establishment phase of bootstrapping protocol in a sensor network. Our proposed scheme offers significantly better network connectivity compared to that for the path key establishment. Moreover, our scheme has better trade-off between communication overhead, computational overhead, network connectivity and resilience against node capture attack than the path key establishment.
A NEW KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORKS  [PDF]
Eric Ke Wang,Lucas C.K.Hui,S.M.Yiu
International Journal of Network Security & Its Applications , 2009,
Abstract: Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the serious imitations in terms of computational power, energy supply, network bandwidth. In order to balance the security and efficiency, we propose a new scheme by employing LU Composition techniques for mutual authenticated pairwise key establishment and integrating LU Matrix with Elliptic Curve Diffie-Hellman for anonymous pathkey establishment. At the meantime, it is able to achieve efficient group key agreement and management. Analysis shows that the new scheme has better performance and provides authenticity and anonymity for sensor to establish multiple kinds of keys, compared with previous related works.
A new key establishment scheme for wireless sensor networks  [PDF]
Eric Ke Wang,Lucas C. K. Hui,S. M. Yiu
Computer Science , 2010,
Abstract: Traditional key management techniques, such as public key cryptography or key distribution center (e.g., Kerberos), are often not effective for wireless sensor networks for the serious limitations in terms of computational power, energy supply, network bandwidth. In order to balance the security and efficiency, we propose a new scheme by employing LU Composition techniques for mutual authenticated pairwise key establishment and integrating LU Matrix with Elliptic Curve Diffie-Hellman for anonymous pathkey establishment. At the meantime, it is able to achieve efficient group key agreement and management. Analysis shows that the new scheme has better performance and provides authenticity and anonymity for sensor to establish multiple kinds of keys, compared with previous related works.
Secure Clustering and Symmetric Key Establishment in Heterogeneous Wireless Sensor Networks  [cached]
Azarderskhsh Reza,Reyhani-Masoleh Arash
EURASIP Journal on Wireless Communications and Networking , 2011,
Abstract: Information security in infrastructureless wireless sensor networks (WSNs) is one of the most important research challenges. In these networks, sensor nodes are typically sprinkled liberally in the field in order to monitor, gather, disseminate, and provide the sensed data to the command node. Various studies have focused on key establishment schemes in homogeneous WSNs. However, recent research has shown that achieving survivability in WSNs requires a hierarchy and heterogeneous infrastructure. In this paper, to address security issues in the heterogeneous WSNs, we propose a secure clustering scheme along with a deterministic pairwise key management scheme based on public key cryptography. The proposed security mechanism guarantees that any two sensor nodes located in the same cluster and routing path can directly establish a pairwise key without disclosing any information to other nodes. Through security performance evaluation, it is shown that the proposed scheme guarantees node-to-node authentication, high resiliency against node capture, and minimum memory space requirement.
Page 1 /100
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.