没有合适的资源?快使用搜索试试~ 我知道了~
资源推荐
资源详情
资源评论
X. Cheng, W. Li, and T. Znati (Eds.): WASA 2006, LNCS 4138, pp. 457
–
466, 2006.
© Springer-Verlag Berlin Heidelberg 2006
Key Management in Sensor Networks
Guorui Li
1
, Jingsha He
2
, and Yingfang Fu
1
1
College of Computer Science and Technology, Beijing University of Technology,
Beijing 100022, China
{liguorui, fmsik}@emails.bjut.edu.cn
2
School of Software Engineering, Beijing University of Technology,
Beijing 100022, China
jhe@bjut.edu.cn
Abstract. Sensor networks are widely used in a variety of commercial and
military applications due to their self-organization characteristics and distributed
nature. As a basic requirement for supporting security in sensor networks, key
management plays an essential role in authentication and encryption. In this
paper, we describe the hexagon-based key predistribution scheme and show that
it can improve the effectiveness of key management in sensor networks. We
show that this key management scheme can improve the probability of
establishing pairwise keys between sensor nodes of up to two hops apart by more
than 40% over other schemes. We also show that the security of a sensor network
would decrease with the increase in sensor node deployment density or in signal
propagation distance.
Keywords: sensor networks, security, key management.
1 Introduction
The development of wireless technologies has made it possible to deploy a large
number of low-cost, low-power and high-performance sensor nodes in a wireless
sensor network. These sensor nodes collect environmental data such as temperature,
humidity and pressure and transmit the data to collection nodes through wireless links.
The characteristics exhibited in a wireless sensor network, such as self-organization,
self-healing, distribution and loose coupling, make such networks suitable for a variety
of commercial and military applications, especially in hostile environments.
Security plays an essential role in wireless sensor networks because the
confidentiality, integrity and availability of the transmitted data between sensor nodes
must be preserved in a hostile environment. As a part of the basic requirement for
security, key management plays a central role in encryption and authentication.
However, due to resource constraints in sensor nodes, many ordinary security
mechanisms such as public key-based authentication and the corresponding key
management schemes are impractical, and sometimes infeasible in sensor networks.
There are currently three types of key management schemes that are commonly used
in sensor networks: trusted server scheme, self-enforcing scheme, and key
predistribution scheme. The trusted server scheme relies on a trusted server for key
management, e.g., the Kerberos. This type of scheme is not very suitable for sensor
资源评论
- dlut08122012-12-18好文章,思路挺好的
- laochen2012-12-06代码不错的,辛苦了
yuan15548
- 粉丝: 0
- 资源: 1
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功