A survey of key management schemes in wireless sensor networks
Computer Communications
A Misused Key Detection Mechanism for Hierarchical Routings in Wireless Sensor Network
NCM '08 Proceedings of the 2008 Fourth International Conference on Networked Computing and Advanced Information Management - Volume 01
An Enhanced Misused Key Detection Mechanism in Wireless Sensor Networks
SENSORCOMM '08 Proceedings of the 2008 Second International Conference on Sensor Technologies and Applications
In-network aggregation techniques for wireless sensor networks: a survey
IEEE Wireless Communications
Hi-index | 0.00 |
In Wireless Sensor Networks, key management is required to offer a secure communication between sensor nodes. Many key management mechanisms have been proposed while considering the characteristics of sensor nodes. Despite the advances of key management techniques, wireless sensor networks still have vulnerable point since sensor nodes have the communication restrictions such as an ultralight, a low power and a short distance. Therefore an adversary can compromise easily a few sensor nodes and may obtain keys between noncompromised nodes. By using obtained keys, the adversary can insert forged or modified messages. The abused key by adversary is called "misused key". In wireless sensor network, the misused key can cause mortal consequences to user. This paper introduces a misused key detection mechanism of Liu and Dong and proposes efficient and secure misused key detection mechanism in wireless sensor networks. Additionally, in our simulation result, the energy consumption of our scheme is 20% more efficient than that of the Liu and Dong's scheme on the average.