Energy-Based Key Management Scheme in Wireless Sensor Networks

Due to limited resources and the threats to the security, a challenging problem is how to implement secure pairwise communications among any pair of sensors in a wireless sensor network. An energy-based key management (EKM) scheme was proposed in this paper. This scheme stored identifier, residual energy and the pairwise keys into each node in the key pre-distribution phase, searched for better secure links according to the identifier and residual energy, and then took multiplied times hash functions to implement the security for EKM scheme the view of the multi-hop communication. Both analytical evaluations and extensive simulations of EKM scheme were provided. The results indicate that EKM scheme has lower energy consumption and longer the lifetime of the network, and reduces the probability of nodes capture

[1]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[2]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[3]  Donggang Liu,et al.  Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.

[4]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[5]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[6]  Miodrag Potkonjak,et al.  On communication security in wireless ad-hoc sensor networks , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[7]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[8]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[9]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[10]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.