A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Maintaining differentiated coverage in heterogeneous sensor networks
EURASIP Journal on Wireless Communications and Networking
Wireless Communications & Mobile Computing - Wireless Network Security
Location-aware key establishment in wireless sensor networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Secure clustering and symmetric key establishment in heterogeneous wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Hi-index | 0.03 |
The growing popularity of wireless sensor networks has brought increasing attention to many security issues for such networks. In these security issues, key management is one of the most challenging and in dire need of solving problems. A lot of research has been mainly concentrated on key management for homogeneous wireless sensor networks. However, such homogeneous networks could restrict them to have a long network lifetime as well as to improve network connectivity. Recent research has shown that heterogeneous wireless sensor networks have greater performance and reliability. In this paper, we propose a key management scheme for heterogeneous wireless sensor networks to improve the random key predistribution scheme using deployment knowledge of nodes and the prior area deployment information. The performance evaluation and security analysis show that our scheme can substantially improve the network connectivity with low complexity and significant reduction on storage requirement, and enhance the network resilience against node capture, compared with existing key management schemes.