SPINS: security protocols for sensor networks
Wireless Networks
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
On Communication Security in Wireless Ad-Hoc Sensor Networks
WETICE '02 Proceedings of the 11th IEEE International Workshops on Enabling Technologies: nfrastructure for Collaborative Enterprises
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
A Low-Energy Key Management Protocol for Wireless Sensor Networks
ISCC '03 Proceedings of the Eighth IEEE International Symposium on Computers and Communications
An authentication framework for hierarchical ad hoc sensor networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Random key-assignment for secure Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Location-aware key management scheme for wireless sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
A survey of key management schemes in wireless sensor networks
Computer Communications
Hybrid Key Establishment Protocol Based on ECC for Wireless Sensor Network
UIC '07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
Information Security Policy Decision Making: An Analytic Hierarchy Process Approach
AMS '09 Proceedings of the 2009 Third Asia International Conference on Modelling & Simulation
A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design
ISC'05 Proceedings of the 8th international conference on Information Security
Hi-index | 0.00 |
Wireless sensor networks (WSN) have been widely used in various applications. Since their sensor nodes are resource-constrained, key management is one of the most challenging issues in design of WSN. Currently, various efficient lightweight key management schemes have been proposed to enable encryption and authentication in WSN for different application scenarios. According to different requirements, it is important to select the trustworthy key management schemes in a WSN for setting up a fully trusted WSN mechanism. In this context, adaptive methods are required to evaluate those schemes. In this paper, we exploit Analytic Hierarchy Process (AHP) to help with the complex decision. Specifically, we consider the following performance criteria: scalability, key connectivity, resilience, storage overhead, processing overhead and communication overhead. Our method is able help choosing a suitable scheme for given requirements.