A key management scheme for heterogeneous sensor networks using keyed-hash chain
|dc.contributor.author||Dillon, Tharam S.|
|dc.identifier.citation||Tian, Biming and Han, Song and Dillon, Tharam. 2009. A key management scheme for heterogeneous sensor networks using keyed-hash chain, in 5th International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2009), Dec 14 2009, pp. 448-456. Wu Yi Mountain, China: IEEE.|
We present a suite of key management scheme for heterogeneous sensor networks. In view of different types of communications, a single key can not satisfy various communication requirements. It is necessary to study the establishment and renewal of different types of keys in heterogeneous sensornetworks. In this paper, we propose a new key management scheme which can support five types of communications. Our basic scheme is based on a keyed-hash chain approach. A new cluster mechanism is used to improve the probability of key sharing between sensors and their cluster heads. Different from existing schemes where a node capture attack might lead to the disclosure of several key chains, our method can avoid this drawback through not storing network-wide generating keys inlow-cost sensors. Only pairwise keys involving the compromised node should be deleted in our scheme. It is motivated by the observation that all the information stored on a sensor may be disclosed once the sensor gets compromised. Through the analysis of both security and performance, we show the scheme meets the security requirements.
|dc.subject||heterogeneous sensor network|
|dc.title||A key management scheme for heterogeneous sensor networks using keyed-hash chain|
|dcterms.source.title||Proceedings of the 5th international conference on mobile ad-hoc and sensor networks (MSN 2009)|
|dcterms.source.series||Proceedings of the 5th international conference on mobile ad-hoc and sensor networks (MSN 2009)|
|dcterms.source.conference||5th International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2009)|
|dcterms.source.conference-start-date||Dec 14 2009|
|dcterms.source.conferencelocation||Wu Yi Mountain, China|
Copyright © 2009 IEEE This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
|curtin.department||Digital Ecosystems and Business Intelligence Institute (DEBII)|
|curtin.faculty||Curtin Business School|
|curtin.faculty||The Digital Ecosystems and Business Intelligence Institute (DEBII)|