Multi-sensor fusion: fundamentals and applications with software
Multi-sensor fusion: fundamentals and applications with software
Wireless integrated network sensors
Communications of the ACM
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Analyzing the energy consumption of security protocols
Proceedings of the 2003 international symposium on Low power electronics and design
Tracking multiple targets with self-organizing distributed ground sensors
Journal of Parallel and Distributed Computing
Mobile Network Analysis Using Probabilistic Connectivity Matrices
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
On the Detection of Clones in Sensor Networks Using Random Key Predistribution
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
IEEE Communications Magazine
Hi-index | 0.00 |
This paper considers the security of sensor network applications. Our approach creates multicast regions that use symmetric key cryptography for communications. Each multicast region contains a single keyserver that is used to perform key management and maintain the integrity of a multicast region. Communications between two multicast regions is performed by nodes that belong to both regions. To ease the network management burden, it is desirable for the networks to self-organize into regions and dynamically select their keyservers. This paper shows how to determine the number of keyservers (k) to use and the size in the number of hops (h) of their multicast regions. We find that power consumption issues provide a natural trade-off that determines optimal values for these parameters. Analysis of one application shows an increase in system security with 70-80% less power overhead than existing security approaches.