Maximum lifetime routing in wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
An efficient scheme for authenticating public keys in sensor networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Power Aware Design of an Elliptic Curve Coprocessor for 8 bit Platforms
PERCOMW '06 Proceedings of the 4th annual IEEE international conference on Pervasive Computing and Communications Workshops
Sizzle: a standards-based end-to-end security architecture for the embedded internet
Sizzle: a standards-based end-to-end security architecture for the embedded internet
Hi-index | 0.00 |
Self organization is an important phase of a wireless sensor network. After deployment, sensors nodes are required to self organize themselves to form a network of their own. Security is an important aspect while forming the network. Only the authorized nodes should be allowed to join the network. For implementing security such as confidentiality, integrity and authentication keys are needed. How keys are handled is described in key management approach. Key management encompasses generation, storage, distribution, re-key and retirement of a key. It is observed that majority of the attacks are carried out during the key distribution phase. Hence, a proper key management is utmost important for implementing fool proof security in a Wireless Sensor Network. Depending upon the type of keys used, for example, symmetric or asymmetric key, key management techniques vary. In this paper an approach to key management for asymmetric key based security schemes of Wireless Sensor Network is proposed. The approach considers entire life of a 'key' and subsequently proposes algorithms/schemes for key (pre) distribution, re-key and revocation.