TEEN: ARouting Protocol for Enhanced Efficiency in Wireless Sensor Networks
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Location dependent key management using random key-predistribution in sensor networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
ACM Transactions on Sensor Networks (TOSN)
MiniSec: a secure sensor network communication architecture
Proceedings of the 6th international conference on Information processing in sensor networks
A survey on clustering algorithms for wireless sensor networks
Computer Communications
A new key management scheme in heterogeneous wireless sensor networks
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Hi-index | 0.00 |
The vulnerable environment and open communication channel make it very necessary to protect wireless sensor networks (WSNs). The key management is the most important way to protect the communication in WSNs. In this paper, we design a Multihop-based Key Management (MKM) which can efficiently enhance the security and survivability in the hierarchical WSNs. Different from previous works, we present the key system as well as the cluster formation. The MKM generates and distributes keys based on hop counts, which not only localizes the key things but also has no overhead. The MKM provides the session keys among sensors and the cluster key between the cluster head and its member nodes. The different hops make the different keys. The MKM can protect the network from the compromised nodes by reducing the high probability of the common keys. The security analysis can effectively prevent several attacks.