Two-Step hierarchical protocols for establishing session keys in wireless sensor networks

  • Authors:
  • Kyungsan Cho;Soo-Young Lee;JongEun Kim

  • Affiliations:
  • Division of Information and Computer Science, Dankook University, Seoul, Korea;Department of Electrical and Computer Engineering, Auburn University, Auburn, AL;Division of Information and Computer Science, Dankook University, Seoul, Korea

  • Venue:
  • ICESS'05 Proceedings of the Second international conference on Embedded Software and Systems
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Secure communication between sensor nodes is required in most of sensor networks, especially those deployed in a hostile environment. Due to the limited energy and computational capability on each sensor node, a public key cryptosystem is not a viable option for a wireless sensor network. Hence, the idea of key pre-distribution has been widely adopted in most of the session key establishment protocols proposed so far. In this paper, 1) several typical session key establishment protocols are analyzed and compared in terms of common criteria, 2) the requirements for improving upon the existing protocols are derived, and 3) two advanced protocols which take a two-step hierarchical approach to satisfying the requirements are proposed. Through the performance analysis, it has been shown that the proposed protocols improve the connectivity of a sensor network, uniqueness of session keys and security over the existing protocols.