A key management scheme for commodity sensor networks

Yong Ho Kim, Mu Hyun Kim, Dong Hoon Lee, Changwook Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

To guarantee secure communication in wireless sensor networks, secret keys should be securely established between sensor nodes. Recently, a simple key distribution scheme has been proposed for pairwise key establishment in sensor networks by Anderson, Chan, and Perrig, They defined a practical attack model for non-critical commodity sensor networks. Unfortunately, the scheme is vulnerable under their attack model. In this paper, we describe the vulnerability in their scheme and propose a modified one. Our scheme is secure under their attack model and the security of our scheme is proved. Furthermore, our scheme does not require additional communication overhead nor additional infrastructure to load potential keys into sensor nodes.

Original languageEnglish
Title of host publicationAd-Hoc, Mobile, and Wireless Networks - 4th International Conference, ADHOC-NOW 2005, Proceedings
PublisherSpringer Verlag
Pages113-126
Number of pages14
ISBN (Print)3540291326, 9783540291329
DOIs
Publication statusPublished - 2005
Event4th International Conference on Ad-Hoc, Mobile, and Wireless Networks, ADHOC-NOW 2005 - Cancun, Mexico
Duration: 2005 Oct 62005 Oct 8

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3738 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other4th International Conference on Ad-Hoc, Mobile, and Wireless Networks, ADHOC-NOW 2005
Country/TerritoryMexico
CityCancun
Period05/10/605/10/8

Keywords

  • Key management
  • Security
  • Wireless sensor networks

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'A key management scheme for commodity sensor networks'. Together they form a unique fingerprint.

Cite this