An efficient key management scheme in hierarchical wireless sensor networks

Zhang, X and Wang, J 2015, 'An efficient key management scheme in hierarchical wireless sensor networks', in 2015 International Conference on Computing, Communication and Security (ICCCS), Pamplemousses, Mauritius, 4-5 December 2015, pp. 1-7.


Document type: Conference Paper
Collection: Conference Papers

Title An efficient key management scheme in hierarchical wireless sensor networks
Author(s) Zhang, X
Wang, J
Year 2015
Conference name 2015 International Conference on Computing, Communication and Security (ICCCS 2015)
Conference location Pamplemousses, Mauritius
Conference dates 4-5 December 2015
Proceedings title 2015 International Conference on Computing, Communication and Security (ICCCS)
Publisher IEEE
Place of publication United States
Start page 1
End page 7
Total pages 7
Abstract In this paper, a secure efficient hierarchical key management scheme (SEHKM) for wireless sensor networks is proposed. It satisfies several requirements of WSN. The design of the scheme is motivated by the constraints of sensor networks and high resources cost in traditional key management techniques. The key management scheme supports the establishment of three types of keys to encrypt messages sent among sensor nodes. They are network key, group key and pairwise key. Network key encrypts broadcast messages and authenticates new nodes. Group key is shared by all nodes in the same cluster. Pairwise key is shared with a specific pair of nodes. In hierarchical WSN, cluster heads are very important due to the structure of the network. In order to improve security strength and reduce resource cost and risk after cluster head compromise, an assistant node is introduced in the scheme. SHEKM includes key establishment, key transportation, mechanisms after node operation and dynamical freshness of keys. The evaluation of SEHKM is presented as well as the comparison with some existing key management schemes. The performance analysis and simulation show that SEHKM is very efficient in computation, communication, and storage while the security strength is high.
Subjects Computer Communications Networks
Wireless Communications
Keyword(s) Wireless sensor networks
Authentication
Logic gates
Cryptography
Routing
Transportation
Copyright notice © 2015 IEEE
ISBN 9781467393546
Versions
Version Filter Type
Access Statistics: 13 Abstract Views  -  Detailed Statistics
Created: Wed, 19 Sep 2018, 13:35:00 EST by Catalyst Administrator
© 2014 RMIT Research Repository • Powered by Fez SoftwareContact us