Abstract | ||
---|---|---|
The last decade has seen major advances in Wireless Sensor Networks (WSN). The limited amount of resources in WSNs is the main challenge for securing them. Indeed, sensors are inherently small devices with limited embedded storage, processor and battery capacity. The situation is even worse when attackers, with virtually unlimited amount of resources, have direct physical access to sensors. Cryptographic keys are used for authentication, authorization, confidentiality, data integrity, as well as many other security services. Several proposals have been made for key management in WSNs. In this paper, we review some notable key management schemes and propose a new one. The originality of our work lies in two main facts: first, we do not place a master key on all sensors before deploying them as several other proposals did, but we rather place the master key in a subset of sensors; second, the master keys are volatile, i.e., sensors use the master key to bootstrap the system and they delete them shortly after that. Our extensive simulations have shown the efficiency of our approach. |
Year | DOI | Venue |
---|---|---|
2019 | 10.1007/s12652-018-0772-9 | Journal of Ambient Intelligence and Humanized Computing |
Keywords | Field | DocType |
Key management, Wireless sensor networks, Secure connectivity coverage, Network scalability, Distributed algorithms | Key management,Data mining,Authentication,Confidentiality,Computer security,Computer science,Distributed algorithm,Data integrity,Physical access,Wireless sensor network,Key (cryptography) | Journal |
Volume | Issue | ISSN |
10 | 9 | 1868-5145 |
Citations | PageRank | References |
3 | 0.39 | 28 |
Authors | ||
7 |
Name | Order | Citations | PageRank |
---|---|---|---|
Abdelkader Laouid | 1 | 22 | 4.52 |
Abdelnasser Dahmani | 2 | 27 | 3.44 |
Hani Ragab Hassen | 3 | 3 | 1.07 |
Ahcène Bounceur | 4 | 306 | 35.05 |
Reinhardt Euler | 5 | 8 | 3.39 |
Farid Lalem | 6 | 21 | 4.54 |
Abdelkamel Tari | 7 | 70 | 24.81 |