A new scheme of key distribution using implicit security in Wireless Sensor Networks

Wireless Sensor Network (WSN) is a noticeable subject currently. There are many WSN applications including military control and environmental monitoring. In these applications, the security of data transmission is an important issue. Because sensor nodes are resource limited and they do not have fixed structure model, there needs an efficiently key distribution and management mechanisms to achieve secure communication. This paper proposes a scheme which uses an implicit security technique to distribute the encrypted key. Because most of operations are computed by the base station, this scheme can extend survival time of the network and it is very appropriate for WSN.

[1]  Amir Hossein Jahangir,et al.  Analysis of Public-Key Cryptography for Wireless Sensor Networks Security , 2008 .

[2]  Alasdair McAndrew Data Encryption Standard (DES) for Sage , 2009 .

[3]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[4]  Lars R. Knudsen,et al.  Advanced Encryption Standard (AES) - An Update , 1999, IMACC.

[5]  Yi Qian,et al.  Towards Survivable and Secure Wireless Sensor Networks , 2007, 2007 IEEE International Performance, Computing, and Communications Conference.

[6]  Simon Heron,et al.  Encryption: Advanced Encryption Standard (AES) , 2009 .

[7]  Subhash C. Kak,et al.  Online data storage using implicit security , 2009, Inf. Sci..

[8]  Dharma P. Agrawal,et al.  Efficient pairwise key establishment and management in static wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[9]  Kamlesh Gupta,et al.  Security issues in wireless sensor networks , 2010 .

[10]  Liu Jian-hui,et al.  Research on key management scheme for WSN based on elliptic curve cryptosystem , 2009, 2009 First International Conference on Networked Digital Technologies.

[11]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[12]  Adrian Perrig,et al.  On the distribution and revocation of cryptographic keys in sensor networks , 2005, IEEE Transactions on Dependable and Secure Computing.

[13]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[14]  Bülent Yener,et al.  Key distribution mechanisms for wireless sensor networks : a survey , 2005 .

[15]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[16]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[17]  Yi Qian,et al.  A design for secure and survivable wireless sensor networks , 2007, IEEE Wireless Communications.

[18]  Donggang Liu,et al.  Security mechanisms for wireless sensor networks , 2005 .

[19]  Howon Kim,et al.  Hash-based Secure Sensor Network Programming Method without Public Key Cryptography , 2006 .

[20]  A. Price,et al.  A key pre-distribution scheme for wireless sensor networks , 2005, Symposium, 2005 Wireless Telecommunications.

[21]  Dawn Song,et al.  Key distribution techniques for sensor networks , 2004 .