Classification of key management schemes for wireless sensor networks

Hwaseong Lee, Yong Ho Kim, Dong Hoon Lee, Jong In Lim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

For secure wireless sensor networks, a pair-wise key between nodes has to be established securely and efficiently. It is common to evaluate the security and efficiency of a (symmetric) key management scheme with those of other schemes without considering adversary's ability. In this paper, we defined attack models according to adversary's ability and classify existing key management schemes according to the attack models. We also suggested a guideline on selecting a proper key scheme with a given attack model. We expect our classification provides a certain criteria to fairly evaluate key management schemes in the same attack model.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages664-673
Number of pages10
Volume4537 LNCS
Publication statusPublished - 2007 Dec 1
EventApWeb/WAIM 2007 International Workshops: 1st International workshop on Database Management and Applications over Networks, DBMAN 2007 - 1st Workshop on Emerging Trends of Web Technologies and Applications, WebETrends 2007 - International Workshop on - Huang Shan, China
Duration: 2007 Jun 162007 Jun 18

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4537 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

OtherApWeb/WAIM 2007 International Workshops: 1st International workshop on Database Management and Applications over Networks, DBMAN 2007 - 1st Workshop on Emerging Trends of Web Technologies and Applications, WebETrends 2007 - International Workshop on
CountryChina
CityHuang Shan
Period07/6/1607/6/18

Fingerprint

Key Management
Wireless Sensor Networks
Wireless sensor networks
Guidelines
Attack
Evaluate
Model
Classify
Vertex of a graph

Keywords

  • Attack model
  • Guideline
  • Key management
  • Security
  • Wireless sensor networks

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Cite this

Lee, H., Kim, Y. H., Lee, D. H., & Lim, J. I. (2007). Classification of key management schemes for wireless sensor networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4537 LNCS, pp. 664-673). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4537 LNCS).

Classification of key management schemes for wireless sensor networks. / Lee, Hwaseong; Kim, Yong Ho; Lee, Dong Hoon; Lim, Jong In.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4537 LNCS 2007. p. 664-673 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4537 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lee, H, Kim, YH, Lee, DH & Lim, JI 2007, Classification of key management schemes for wireless sensor networks. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 4537 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 4537 LNCS, pp. 664-673, ApWeb/WAIM 2007 International Workshops: 1st International workshop on Database Management and Applications over Networks, DBMAN 2007 - 1st Workshop on Emerging Trends of Web Technologies and Applications, WebETrends 2007 - International Workshop on, Huang Shan, China, 07/6/16.
Lee H, Kim YH, Lee DH, Lim JI. Classification of key management schemes for wireless sensor networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4537 LNCS. 2007. p. 664-673. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Lee, Hwaseong ; Kim, Yong Ho ; Lee, Dong Hoon ; Lim, Jong In. / Classification of key management schemes for wireless sensor networks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4537 LNCS 2007. pp. 664-673 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{90e98ea76c6848aebf089c0655c50960,
title = "Classification of key management schemes for wireless sensor networks",
abstract = "For secure wireless sensor networks, a pair-wise key between nodes has to be established securely and efficiently. It is common to evaluate the security and efficiency of a (symmetric) key management scheme with those of other schemes without considering adversary's ability. In this paper, we defined attack models according to adversary's ability and classify existing key management schemes according to the attack models. We also suggested a guideline on selecting a proper key scheme with a given attack model. We expect our classification provides a certain criteria to fairly evaluate key management schemes in the same attack model.",
keywords = "Attack model, Guideline, Key management, Security, Wireless sensor networks",
author = "Hwaseong Lee and Kim, {Yong Ho} and Lee, {Dong Hoon} and Lim, {Jong In}",
year = "2007",
month = "12",
day = "1",
language = "English",
isbn = "9783540729082",
volume = "4537 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "664--673",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - Classification of key management schemes for wireless sensor networks

AU - Lee, Hwaseong

AU - Kim, Yong Ho

AU - Lee, Dong Hoon

AU - Lim, Jong In

PY - 2007/12/1

Y1 - 2007/12/1

N2 - For secure wireless sensor networks, a pair-wise key between nodes has to be established securely and efficiently. It is common to evaluate the security and efficiency of a (symmetric) key management scheme with those of other schemes without considering adversary's ability. In this paper, we defined attack models according to adversary's ability and classify existing key management schemes according to the attack models. We also suggested a guideline on selecting a proper key scheme with a given attack model. We expect our classification provides a certain criteria to fairly evaluate key management schemes in the same attack model.

AB - For secure wireless sensor networks, a pair-wise key between nodes has to be established securely and efficiently. It is common to evaluate the security and efficiency of a (symmetric) key management scheme with those of other schemes without considering adversary's ability. In this paper, we defined attack models according to adversary's ability and classify existing key management schemes according to the attack models. We also suggested a guideline on selecting a proper key scheme with a given attack model. We expect our classification provides a certain criteria to fairly evaluate key management schemes in the same attack model.

KW - Attack model

KW - Guideline

KW - Key management

KW - Security

KW - Wireless sensor networks

UR - http://www.scopus.com/inward/record.url?scp=38049013707&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=38049013707&partnerID=8YFLogxK

M3 - Conference contribution

SN - 9783540729082

VL - 4537 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 664

EP - 673

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

ER -