A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
An architecture for building self-configurable systems
MobiHoc '00 Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Denial of Service in Sensor Networks
Computer
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Key distribution techniques for sensor networks
Wireless sensor networks
The Strange Logic of Random Graphs
The Strange Logic of Random Graphs
New directions in cryptography
IEEE Transactions on Information Theory
A key management protocol with robust continuity for sensor networks
Computer Standards & Interfaces
Hi-index | 0.24 |
Due to limited energy capacity of batteries, the function lifetime of sensor networks in general is longer than the operational lifetime of single nodes. Therefore, to keep the network working, multiple deployments of sensor nodes are needed. Due to their nature and their operational resource constraints, sensor networks are vulnerable to various types of attacks. Key pre-distribution has been shown to be an effective way to establish secure communication in sensor networks. However, existing schemes of key pre-distribution assume the use of the same pools in various deployments of sensors. We analyzed the vulnerability of the existing key pre-distribution schemes arising out of the repeated use of fixed key information through multiple deployments. We also developed SCON, an approach for key management that provides a significant improvement in security through the use of a unique key pool for each phase of deployment. Nodes of different deployments connect through special nodes called bridge nodes which have keys from adjacent key pools of respective deployments. Furthermore, we show that SCON can perform better by taking advantage of more powerful nodes used as bridge nodes.