A key management scheme for large scale distributed sensor networks

Yong Ho Kim, Hwaseong Lee, Dong Hoon Lee, Jongin Lim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

To guarantee secure communication in wireless sensor networks, secret keys should be securely established between sensor nodes. Recently, an efficient security mechanism was proposed for large-scale distributed sensor networks by Zhu, Setia, and Jajodia. In their scheme, each node uses a single initial key to establish pair-wise keys and erases the key after key setup. If the key is compromised during key setup, however, the entire network will be compromised. Therefore, the performance overhead during key setup is very important for the speedy key establishment. In this paper, we propose a modified scheme which reduces the performance overhead during key setup and has provable security after key setup.

Original languageEnglish
Title of host publicationPersonal Wireless Communications - IFIP TC6 11th International Conference, PWC 2006, Proceedings
EditorsPedro Cuenca, Luiz Orozco-Barbosa
PublisherSpringer Verlag
Pages437-446
Number of pages10
ISBN (Print)3540451749, 9783540451747
DOIs
Publication statusPublished - 2006
EventIFIP TC6 11th International Conference on Personal Wireless Communications, PWC 2006 - Albacete, Spain
Duration: 2006 Sep 202006 Sep 22

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4217 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherIFIP TC6 11th International Conference on Personal Wireless Communications, PWC 2006
CountrySpain
CityAlbacete
Period06/9/2006/9/22

Keywords

  • Key management
  • Security
  • Wireless sensor networks

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'A key management scheme for large scale distributed sensor networks'. Together they form a unique fingerprint.

Cite this