A formally verified decentralized key management architecture for wireless sensor networks

被引:0
|
作者
Law, Yee Wei [1 ]
Corin, Ricardo [1 ]
Etalle, Sandro [1 ]
Hartel, Pieter H. [1 ]
机构
[1] Faculty of Electrical Engineering, Mathematics and Computer Science, University of Twente, PO Box 217, 7500 AE Enschede, Netherlands
关键词
Architecture - Interoperability - Network architecture - Energy utilization;
D O I
10.1007/978-3-540-39867-7_3
中图分类号
学科分类号
摘要
We present a decentralized key management architecture for wireless sensor networks, covering the aspects of key deployment, key refreshment and key establishment. Our architecture is based on a clear set of assumptions and guidelines. Balance between security and energy consumption is achieved by partitioning a system into two interoperable security realms: the supervised realm trades off simplicity and resources for higher security whereas in the unsupervised realm the vice versa is true. Key deployment uses minimal key storage while key refreshment is based on the well-studied scheme of Abdalla et al. The keying protocols involved use only symmetric cryptography and have all been verified with our constraint solving-based protocol verification tool CoProVe. © IFIP International Federation for Information Processing 2003.
引用
收藏
页码:27 / 39
相关论文
共 50 条
  • [1] A formally verified decentralized key management architecture for wireless sensor networks
    Law, YW
    Corin, R
    Etalle, S
    Hartel, PH
    [J]. PERSONAL WIRELESS COMMUNICATIONS, PROCEEDINGS, 2003, 2775 : 27 - 39
  • [2] Formally Verified Authenticated Query Dissemination in Sensor Networks
    Werner, Frank
    Benenson, Zinaida
    [J]. PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, 2009, 41 (04): : 154 - +
  • [3] Key Management in Wireless Sensor Networks
    Mansour, Ismail
    Chalhoub, Gerard
    Lafourcade, Pascal
    [J]. JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2015, 4 (03): : 251 - 273
  • [4] Key management in wireless sensor networks
    Lee, YH
    Phadke, V
    Deshmukh, A
    Lee, JW
    [J]. SECURITY IN AD-HOC AND SENSOR NETWORKS, 2005, 3313 : 190 - 204
  • [5] Key management in wireless sensor networks
    Lopriore, Lanfranco
    [J]. INFORMATION SECURITY JOURNAL, 2019, 28 (1-2): : 20 - 34
  • [6] Towards Formally Verified Key Management for Industrial Control Systems
    Kulik, Tomas
    Boudjadar, Jalil
    Aranha, Diego F.
    [J]. 2020 IEEE/ACM 8TH INTERNATIONAL CONFERENCE ON FORMAL METHODS IN SOFTWARE ENGINEERING, FORMALISE, 2020, : 119 - 129
  • [7] Formally Verified Solution to Resolve Tunnel Attacks in Wireless Sensor Network
    Saghar, Kashif
    Farid, Hunaina
    Bouridane, Ahmed
    [J]. PROCEEDINGS OF 2017 14TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2017, : 448 - 455
  • [8] A Decentralized Hierarchical Key Management Scheme for Grid-Organized Wireless Sensor Networks (DHKM)
    Khasawneh, Samer
    Chang, Zhengwei
    Liu, Rongke
    Kadoch, Michel
    Lu, Jizhao
    [J]. 2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 1613 - 1617
  • [9] Distributed Key Management for Wireless Sensor Networks
    Kuldeep
    Garimella, Ramamurthy
    [J]. Q2SWINET09: PROCEEDING OF THE FIFTH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2009, : 23 - 28
  • [10] Adaptive Key Management for Wireless Sensor Networks
    Cheneau, Tony
    Ranganathan, Mudumbai
    [J]. 2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 395 - 401