A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Key Establishment Protocols for Secure Mobile Communications: A Selective Survey
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Reducing radio energy consumption of key management protocols for wireless sensor networks
Proceedings of the 2004 international symposium on Low power electronics and design
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Forward-secure key evolution in wireless sensor networks
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
Diverging keys in wireless sensor networks
ISC'06 Proceedings of the 9th international conference on Information Security
Key establishment scheme for sensor networks with low communication cost
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Hi-index | 0.00 |
A wireless sensor network (WSN) is composed of many sensor motes that are resource-constrained tiny devices, usually driven by battery. It is critical to save the energy consumption, which is mainly due to the communication overheads, in order to extend the life-span of WSN. Key management protocol is an important component to support secure communications in WSN. Two very efficient protocols appeared in the literature: the "Key Divergent Protocol" (KDP) designed by Ren et al. and the "Key Evolution Protocol" (KEP) designed by Klonowski et al. The KEP is an improvement on the KDP to provide forward security by using a cryptographic hash function rather than flipping a random bit in the process of key update, at the expense of a bit higher computational cost. These two protocols are designed specifically for the WSN environment, without incurring additional communication overheads for establishing a secret key between any pair of sensor nodes. In this paper, we present the implementation and performance analysis results that we have conducted on the KDP and KEP. We demonstrate their feasibility in the real WSN testbed and provide the APIs that are ready for integration into WSN applications.