A design of optimal key management scheme for secure and survivable wireless sensor networks

被引:4
|
作者
Qian, Yi [1 ,2 ]
Lu, Kejie [2 ]
Rong, Bo [2 ]
Tipper, David [3 ]
机构
[1] NIST, Gaithersburg, MD 20899 USA
[2] Univ Puerto Rico, Dept Elect & Comp Engn, Mayaguez, PR 00681 USA
[3] Univ Pittsburgh, Dept Informat Sci & Telecommun, Pittsburgh, PA 15260 USA
基金
美国国家科学基金会;
关键词
key management; security; survivability; heterogeneous; wireless sensor network; optimization; genetic algorithm;
D O I
10.1002/sec.3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we investigate optimal key management design for secure and survivable heterogeneous wireless sensor networks (HWSNs). In particular, we formulate the key management problem as a multi-objective optimization problem, in which the cost of the sensor network, and the security and survivability metrics of the sensor network are taken into account. To solve the multi-objective optimization model, we develop a genetic algorithm (GA)based approach that can efficiently obtain near-optimal solutions. We show the performance of our scheme through extensive numerical results. With a small amount of powerful sensor nodes in HWSN, we can balance the cost of the sensor network and the resilience of the sensor network with the required security constraint in different hostile environment. Copyright (C) 2008 John Wiley & Sons, Ltd.
引用
收藏
页码:75 / 82
页数:8
相关论文
共 50 条
  • [1] Optimal key management for secure and survivable heterogeneous wireless sensor networks
    Qian, Yi
    Lu, Kejie
    Rong, Bo
    Zhu, Hua
    [J]. GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 996 - +
  • [2] A design for secure and survivable wireless sensor networks
    Qian, Yi
    Lu, Kejie
    Tipper, David
    [J]. IEEE WIRELESS COMMUNICATIONS, 2007, 14 (05) : 30 - 37
  • [3] An optimal key management scheme for wireless sensor networks
    Qian, Yi
    Lu, Kejie
    Rong, Bo
    Lugo, Hector
    Tipper, David
    [J]. 2007 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-8, 2007, : 1 - +
  • [4] A Secure Authentication and Key Management Scheme for Wireless Sensor Networks
    Khan, Sarmadullah
    Khan, Rafiullah
    [J]. SENSOR SYSTEMS AND SOFTWARE, 2015, 143 : 51 - 60
  • [5] A secure and efficient key management scheme for wireless sensor networks
    Kim, Yong Ho
    Lee, Hwaseong
    Lee, Dong Hoon
    [J]. 2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 162 - 167
  • [6] A secure triple-key management scheme for wireless sensor networks
    Zia, Tanveer
    Zomaya, Albert
    [J]. 25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, : 3216 - 3217
  • [7] A New Hierarchical Key Management Scheme for Secure Clustering in Wireless Sensor Networks
    Messai, Mohamed-Lamine
    Seba, Hamida
    Aliouat, Makhlouf
    [J]. WIRED/WIRELESS INTERNET COMMUNICATIONS, WWIC 2015, 2015, 9071 : 411 - 424
  • [8] On the design of a secure user authentication and key agreement scheme for wireless sensor networks
    Kumari, Saru
    Das, Ashok Kumar
    Wazid, Mohammad
    Li, Xiong
    Wu, Fan
    Choo, Kim-Kwang Raymond
    Khan, Muhammad Khurram
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23):
  • [9] Towards survivable and secure wireless sensor networks
    Qian, Yi
    Lu, Kejie
    Tipper, David
    [J]. 2007 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2007, : 442 - +
  • [10] A Secure Key Management Scheme in Wireless Mesh Networks
    Kandah, Farah
    Zhang, Weiyi
    Du, Xiaojiang
    Singh, Yashaswi
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,