A key management scheme for commodity sensor networks

Yong Ho Kim, Mu Hyun Kim, Dong Hoon Lee, Changwook Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

To guarantee secure communication in wireless sensor networks, secret keys should be securely established between sensor nodes. Recently, a simple key distribution scheme has been proposed for pairwise key establishment in sensor networks by Anderson, Chan, and Perrig, They defined a practical attack model for non-critical commodity sensor networks. Unfortunately, the scheme is vulnerable under their attack model. In this paper, we describe the vulnerability in their scheme and propose a modified one. Our scheme is secure under their attack model and the security of our scheme is proved. Furthermore, our scheme does not require additional communication overhead nor additional infrastructure to load potential keys into sensor nodes.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages113-126
Number of pages14
Volume3738 LNCS
Publication statusPublished - 2005 Dec 1
Event4th International Conference on Ad-Hoc, Mobile, and Wireless Networks, ADHOC-NOW 2005 - Cancun, Mexico
Duration: 2005 Oct 62005 Oct 8

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3738 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other4th International Conference on Ad-Hoc, Mobile, and Wireless Networks, ADHOC-NOW 2005
CountryMexico
CityCancun
Period05/10/605/10/8

Keywords

  • Key management
  • Security
  • Wireless sensor networks

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Fingerprint Dive into the research topics of 'A key management scheme for commodity sensor networks'. Together they form a unique fingerprint.

  • Cite this

    Kim, Y. H., Kim, M. H., Lee, D. H., & Kim, C. (2005). A key management scheme for commodity sensor networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3738 LNCS, pp. 113-126). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3738 LNCS).