Wireless integrated network sensors
Communications of the ACM
Habitat monitoring: application driver for wireless communications technology
SIGCOMM LA '01 Workshop on Data communication in Latin America and the Caribbean
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
The Aware Home: A Living Laboratory for Ubiquitous Computing Research
CoBuild '99 Proceedings of the Second International Workshop on Cooperative Buildings, Integrating Information, Organization, and Architecture
At Home with Ubiquitous Computing: Seven Challenges
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Proceedings of the 2nd international conference on Ubiquitous information management and communication
SpringSim '07 Proceedings of the 2007 spring simulaiton multiconference - Volume 1
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services
Two-Step hierarchical protocols for establishing session keys in wireless sensor networks
ICESS'05 Proceedings of the Second international conference on Embedded Software and Systems
A beneficial analysis of deployment knowledge for key distribution in wireless sensor networks
Security and Communication Networks
Hi-index | 0.00 |
The security of sensor networks is a challenging area. Key management is one of the crucial parts in constructing the security among sensor nodes. However, key management protocols require a great deal of energy consumption, particularly in the transmission of initial key negotiation messages. In this paper, we examine three previously published sensor network security schemes: SPINS and C&R for master-key-based schemes, and Eschenhaur-Gligor (EG) for distributed-key-based schemes. We then present two new low-power schemes, which we call BROSK and OKS as alternatives to master-key-based schemes and distributed-key-based schemes, respectively. Compared to SPINS and C&R protocols, BROSK can reduce energy consumption by up to 12X by reducing the number of data transmissions in the key negotiation process. Compared with EG, OKS reduces energy by up to 96% and reduces memory requirements by up to 78%.