Classification of Key Management Schemes for Wireless Sensor Networks

  • Authors:
  • Hwaseong Lee;Yong Ho Kim;Dong Hoon Lee;Jongin Lim

  • Affiliations:
  • Center for Information Security Technologies (CIST), Korea University, ;Center for Information Security Technologies (CIST), Korea University, ;Center for Information Security Technologies (CIST), Korea University, ;Center for Information Security Technologies (CIST), Korea University,

  • Venue:
  • Proceedings of the APWeb/WAIM 2007 DBMAN, WebETrends, PAIS and ASWAN international workshops on Advances in Web and Network Technologies, and Information Management
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

For secure wireless sensor networks, a pair-wise key between nodes has to be established securely and efficiently. It is common to evaluate the security and efficiency of a (symmetric) key management scheme with those of other schemes without considering adversary's ability. In this paper, we defined attack models according to adversary's ability and classify existing key management schemes according to the attack models. We also suggested a guideline on selecting a proper key scheme with a given attack model. We expect our classification provides a certain criteria to fairly evaluate key management schemes in the same attack model.