An optimal class of symmetric key generation systems
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Handbook of Applied Cryptography
Handbook of Applied Cryptography
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
SeGrid: a secure grid framework for sensor networks
EURASIP Journal on Wireless Communications and Networking
TLKMS: a dynamic keys management scheme for large-scale wireless sensor networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
SeGrid: a secure grid infrastructure for sensor networks
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
Hi-index | 0.00 |
Sensor networks are characterized by strict resource limitations and large scalability. Many sensor network applications require secure communication, a crucial component, especially in harsh environments. Symmetric key cryptography is very attractive in sensor networks due to its efficiency, but establishing a shared key for communicating parties is very challenging. The low computational capability and small storage budget within sensors render many popular public-key based key distribution and management mechanisms impractical. In this paper, we propose and analyze a truly in-situ key management scheme for large scale sensor networks, called: Public Key Management (PKM). In this scheme, we deploy service and worker sensors. The service sensors contain a key space, while worker sensors are deployed blind, with no pre-deployment knowledge. Worker sensors obtain security information from service sensors through a secure channel after deployment. After obtaining security information, worker sensors compute shared keys with their neighbors. For security reasons, service sensors erase stored key space information after deployment. During this procedure, PKM shifts a large amount of computational overhead from worker sensors to service sensors, thus conserving worker sensors' resources. PKM's performance, in terms of storage, computational overhead and resiliency, is very good.