A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Energy-Aware Routing in Cluster-Based Sensor Networks
MASCOTS '02 Proceedings of the 10th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Combinatorial Optimization of Group Key Management
Journal of Network and Systems Management
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
PERCOM '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks
IEEE Transactions on Parallel and Distributed Systems
Scalable and efficient key management for heterogeneous sensor networks
The Journal of Supercomputing
A survey of security issues in wireless sensor networks
IEEE Communications Surveys & Tutorials
The capacity of wireless networks
IEEE Transactions on Information Theory
Hi-index | 0.00 |
Ubiquitous computing environments find their practical implementations through wireless sensor networks, which sense a relationship among themselves and the environment. Presently devised key management schemes are classified namely for homogeneous environments, or heterogeneous environments. In this paper, we propose a deployment conscious security framework supporting, a shift of complex operations to more capable nodes of heterogeneous environment and relieving resource constrained generic sensor nodes of major activities. We introduced a concept of deployment knowledge independent group key generation using a special kind of heterogeneitymultilevel transmission. Performance of proposed key management schemes is evaluated across relevant matrices and concluded to be satisfactory. Findings show that asymmetric key cryptography is comparatively more demanding in resources than symmetric version but ensures maximum security. Through our work we able to conclude that a hybrid of asymmetric and symmetric key cryptography best suits heterogeneous environments.