A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks
dc.contributor.author | Tian, Biming | |
dc.contributor.author | Han, Song | |
dc.contributor.author | Parvin, Sazia | |
dc.contributor.author | Dillon, Tharam S. | |
dc.contributor.editor | Jiannong Cao | |
dc.contributor.editor | Lui Sha | |
dc.date.accessioned | 2017-01-30T14:57:20Z | |
dc.date.available | 2017-01-30T14:57:20Z | |
dc.date.created | 2011-03-14T20:01:40Z | |
dc.date.issued | 2010 | |
dc.identifier.citation | Tian, Biming and Han, Song and Parvin, Sazia and Dillon, Tharam S. 2010. A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks, in Cao, J. and Sha, L. (ed), 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2010), Dec 11 2010, pp. 617-623. Hong Kong: IEEE. | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/42092 | |
dc.description.abstract |
The security of Wireless Sensor Networks (WSNs) has a direct reliance on secure and efficient key management. This leaves key management as a fundamental research topic in the field of WSNs security. Among the proposed key management schemes for WSNs security, LEAP (Localized Encryption and Authentication Protocol) has been regarded as an efficient protocol over the last years. LEAP supports the establishment of four types of keys. The security of these keys is under the assumption that the initial deployment phase is secure and the initial key is erased from sensor nodes after the initialization phase. However, the initial key is used again for node addition after the initialization phase whereas the new node can be compromised before erasing the key. A time-based key management scheme rethought the security of LEAP. We show the deficiency of the time-based key management scheme and proposed a key management scheme for multi-phase WSNs in this paper. The proposed scheme disperses the damage resulting from the disclosure of the initial key. We show it has better resilience and higher key connectivity probability through the analysis. | |
dc.publisher | IEEE | |
dc.relation.uri | http://doi.ieeecomputersociety.org/10.1109/EUC.2010.99 | |
dc.subject | key predistribution | |
dc.subject | Wireless Sensor Networks (WSNs) | |
dc.subject | Key management | |
dc.title | A Key Management Protocol for Multiphase Hierarchical Wireless Sensor Networks | |
dc.type | Conference Paper | |
dcterms.source.startPage | 617 | |
dcterms.source.endPage | 623 | |
dcterms.source.title | Proceedings of the 2010 IEEE/IFIP international conference on embedded and ubiquitous computing (EUC 2010) | |
dcterms.source.series | Proceedings of the 2010 IEEE/IFIP international conference on embedded and ubiquitous computing (EUC 2010) | |
dcterms.source.isbn | 9780769543222 | |
dcterms.source.conference | 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2010) | |
dcterms.source.conference-start-date | Dec 11 2010 | |
dcterms.source.conferencelocation | Hong Kong | |
dcterms.source.place | Hong Kong | |
curtin.note |
Copyright © 2010 IEEE This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. | |
curtin.department | Digital Ecosystems and Business Intelligence Institute (DEBII) | |
curtin.accessStatus | Open access |