Secure Broadcasting Using the Secure Lock
IEEE Transactions on Software Engineering
Iolus: a framework for scalable secure multicasting
SIGCOMM '97 Proceedings of the ACM SIGCOMM '97 conference on Applications, technologies, architectures, and protocols for computer communication
Algebraic aspects of cryptography
Algebraic aspects of cryptography
SPINS: security protocols for sensor networks
Wireless Networks
An Adaptable Energy-Efficient Medium Access Control Protocol for Wireless Sensor Networks
HICSS '07 Proceedings of the 40th Annual Hawaii International Conference on System Sciences
Hierarchical group access control for secure multicast communications
IEEE/ACM Transactions on Networking (TON)
A survey of security issues in wireless sensor networks
IEEE Communications Surveys & Tutorials
Wireless multimedia sensor networks: A survey
IEEE Wireless Communications
Securing wireless sensor networks against aggregator compromises
IEEE Communications Magazine
Scalable secure group communication over IP multicast
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
As wireless sensor networks (WSNs) become more prolific, the need to secure their communications increases. This paper describes the impact of using three rekey protocols – pair-wise, hierarchical and secure lock – for a WSN using the Hubenko architecture. The performance of each protocol is evaluated within a Matlab simulation to determine the impact of each on the number of bits transmitted, total power required and memory occupied. Results indicate that the Hubenko architecture does significantly increase system performance with the selection of the rekey protocol being driven by the size of the network and available memory. In terms of the number of bits transmitted, secure lock is the most efficient for small networks, while hierarchical is best for networks of 500 or more nodes. In terms of memory used, secure lock performs best for small networks, while hierarchical is best for networks with 100 or more nodes.