Wireless integrated network sensors
Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Revisiting random key pre-distribution schemes for wireless sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
NTRUSign: digital signatures using the NTRU lattice
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
J-Sim: a simulation and emulation environment for wireless sensor networks
IEEE Wireless Communications
Hi-index | 0.00 |
Data security in wireless sensor networks is very important, especially in hostile environment, where we must ensure that data is authentic, confidential, and not tampered on the road. Network authenticity and confidentiality need the existence of shared keys. These keys are highly recommended to be in small scopes so that the compromise of one node will not affect the whole network. Key management is critical to maintain the security functions. In this paper we introduce a new key management algorithm, which ensures that most of the node's neighbors are reliable. The proposed algorithm minimizes interaction with base station, number of transmitted packets, and energy consumption. In addition, it does not use large scope keys. Simulation results proof that the proposed algorithm is scalable in terms of storage and communication overhead, such that there is no correlation between the number of nodes in the network from one side and number of reliable neighbors and number of packets transmitted from the other side.