Classification of key management schemes for wireless sensor networks

Hwaseong Lee, Yong Ho Kim, Dong Hoon Lee, Jongin Lim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

For secure wireless sensor networks, a pair-wise key between nodes has to be established securely and efficiently. It is common to evaluate the security and efficiency of a (symmetric) key management scheme with those of other schemes without considering adversary's ability. In this paper, we defined attack models according to adversary's ability and classify existing key management schemes according to the attack models. We also suggested a guideline on selecting a proper key scheme with a given attack model. We expect our classification provides a certain criteria to fairly evaluate key management schemes in the same attack model.

Original languageEnglish
Title of host publicationAdvances in Web and Network Technologies, and Information Management - APWeb/WAIM 2007 International Workshops DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Proceedings
Pages664-673
Number of pages10
Publication statusPublished - 2007 Dec 1
EventApWeb/WAIM 2007 International Workshops: 1st International workshop on Database Management and Applications over Networks, DBMAN 2007 - 1st Workshop on Emerging Trends of Web Technologies and Applications, WebETrends 2007 - International Workshop on - Huang Shan, China
Duration: 2007 Jun 162007 Jun 18

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4537 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherApWeb/WAIM 2007 International Workshops: 1st International workshop on Database Management and Applications over Networks, DBMAN 2007 - 1st Workshop on Emerging Trends of Web Technologies and Applications, WebETrends 2007 - International Workshop on
CountryChina
CityHuang Shan
Period07/6/1607/6/18

    Fingerprint

Keywords

  • Attack model
  • Guideline
  • Key management
  • Security
  • Wireless sensor networks

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Lee, H., Kim, Y. H., Lee, D. H., & Lim, J. (2007). Classification of key management schemes for wireless sensor networks. In Advances in Web and Network Technologies, and Information Management - APWeb/WAIM 2007 International Workshops DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Proceedings (pp. 664-673). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4537 LNCS).