A key management scheme for commodity sensor networks

Yong Ho Kim, Mu Hyun Kim, Dong Hoon Lee, Changwook Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)


To guarantee secure communication in wireless sensor networks, secret keys should be securely established between sensor nodes. Recently, a simple key distribution scheme has been proposed for pairwise key establishment in sensor networks by Anderson, Chan, and Perrig, They defined a practical attack model for non-critical commodity sensor networks. Unfortunately, the scheme is vulnerable under their attack model. In this paper, we describe the vulnerability in their scheme and propose a modified one. Our scheme is secure under their attack model and the security of our scheme is proved. Furthermore, our scheme does not require additional communication overhead nor additional infrastructure to load potential keys into sensor nodes.

Original languageEnglish
Title of host publicationAd-Hoc, Mobile, and Wireless Networks - 4th International Conference, ADHOC-NOW 2005, Proceedings
PublisherSpringer Verlag
Number of pages14
ISBN (Print)3540291326, 9783540291329
Publication statusPublished - 2005
Event4th International Conference on Ad-Hoc, Mobile, and Wireless Networks, ADHOC-NOW 2005 - Cancun, Mexico
Duration: 2005 Oct 62005 Oct 8

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3738 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Other4th International Conference on Ad-Hoc, Mobile, and Wireless Networks, ADHOC-NOW 2005


  • Key management
  • Security
  • Wireless sensor networks

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)


Dive into the research topics of 'A key management scheme for commodity sensor networks'. Together they form a unique fingerprint.

Cite this