Communication pattern based key establishment scheme in heterogeneous wireless sensor networks

Daehee Kim, Dongwan Kim, Sun-Shin An

Research output: Contribution to journalArticle

8 Citations (Scopus)

Abstract

In this paper, we propose a symmetric key establishment scheme for wireless sensor networks which tries to minimize the resource usage while satisfying the security requirements. This is accomplished by taking advantage of the communication pattern of wireless sensor networks and adopting heterogeneous wireless sensor networks. By considering the unique communication pattern of wireless sensor networks due to the nature of information gathering from the physical world, the number of keys to be established is minimized and, consequently, the overhead spent for establishing keys decreases. With heterogeneous wireless sensor networks, we can build a hybrid scheme where a small number of powerful nodes do more works than a large number of resource-constrained nodes to provide enhanced security service such as broadcast authentication and reduce the burden of resource-limited nodes. In addition, an on-demand key establishment scheme is introduced to support extra communications and optimize the resource usage. Our performance analysis shows that the proposed scheme is very efficient and highly scalable in terms of storage, communication and computation overhead. Furthermore, our proposed scheme not only satisfies the security requirements but also provides resilience to several attacks.

Original languageEnglish
Pages (from-to)1249-1272
Number of pages24
JournalKSII Transactions on Internet and Information Systems
Volume10
Issue number3
DOIs
Publication statusPublished - 2016 Mar 31

Keywords

  • Broadcast authentication
  • Communication pattern
  • Heterogeneous wireless sensor networks
  • Key establishment
  • On-demand
  • Wireless sensor networks

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems

Fingerprint Dive into the research topics of 'Communication pattern based key establishment scheme in heterogeneous wireless sensor networks'. Together they form a unique fingerprint.

  • Cite this