Providing perfect forward secrecy for location-aware wireless sensor networks

被引:0
|
作者
Chi-Tung Chen
Shu-Yan Huang
Iuon-Chang Lin
机构
[1] National Chin-Yi University of Technology,Department of Distribution Management
[2] National Chung Hsing University,Department of Management Information Systems
[3] Aisa University,Department of Photonics and Communication Engineering
关键词
Wireless sensor network; Key management; Perfect forward secrecy;
D O I
暂无
中图分类号
学科分类号
摘要
Sensor nodes are resource-constrained, such as low battery life, computation, bandwidth and memory, so traditional public key schemes are impractical in wireless sensor networks. In the previous schemes, symmetric cryptography is the most common method used in sensor nodes. How to distribute keys into every sensor node is an important issue in many applications for hierarchical sensor networks. Once adversaries compromise a sensor node, they can obtain all information from the sensor’s memory, such as keying material. The revocation of compromised sensor nodes is also a necessary but troublesome operation. These compromised sensor nodes may lead to the compromise of the entire network. In this article, we present an efficient approach to establish security links between each sensor node/cluster head and its neighbor/member. Our scheme only requires small memory size for each cluster head and sensor node, and it can also ensure perfect forward secrecy via changing session key in every transmission.
引用
收藏
相关论文
共 50 条
  • [1] Providing perfect forward secrecy for location-aware wireless sensor networks
    Chen, Chi-Tung
    Huang, Shu-Yan
    Lin, Iuon-Chang
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2012,
  • [2] Location-aware ID assignment in wireless sensor networks
    Liu, Yunhuai
    Ni, Lionel M.
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS, VOLS 1 AND 2, 2006, : 485 - 489
  • [3] LEDS: Providing location-aware end-to-end data security in wireless sensor networks
    Ren, Kui
    Lou, Wenjing
    Zhang, Yanchao
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (05) : 585 - 598
  • [4] LEDS: Providing location-aware end-to-end data security in wireless sensor networks
    Ren, Kui
    Lou, Wenjing
    Zhang, Yanchao
    [J]. 25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, : 2584 - 2595
  • [5] Location-aware Affinity Propagation Clustering in Wireless Sensor Networks
    ElGammal, Mahmoud
    Eltoweissy, Mohamed
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, 2009, : 471 - 475
  • [6] Trust and Location-Aware Routing Protocol for Wireless Sensor Networks
    Vamsi, P. Raghu
    Kant, Krishna
    [J]. IETE JOURNAL OF RESEARCH, 2016, 62 (05) : 634 - 644
  • [7] A location-aware scheme for key establishment in wireless sensor networks
    Das, Ashok Kumar
    Das, Abhijit
    Mohapatra, Surjyakanta
    Vavilapalli, Srihari
    [J]. 2006 1ST INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS SOFTWARE & MIDDLEWARE, VOLS 1 AND 2, 2006, : 567 - +
  • [8] A Location-Aware Authentication and Key Management Scheme for Wireless Sensor Networks
    Abdallah, Walid
    Boudriga, Noureddine
    [J]. 2016 22ND ASIA-PACIFIC CONFERENCE ON COMMUNICATIONS (APCC), 2016, : 488 - 495
  • [9] A Location-Aware Routing with Hole Detouring Technique for Wireless Sensor Networks
    Park, Yong Suk
    Lee, Kyu Yeol
    Ca Van Phan
    Choi, Hyo Hyun
    Kim, Jeong Geun
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2011, E94B (03) : 827 - 830
  • [10] A location-aware key predistribution scheme for distributed wireless sensor networks
    Canh, Ngo Trong
    Van Phuong, Tran
    Lee, Young-Koo
    Lee, Sungyoung
    Lee, Heejo
    [J]. 2007 15TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, 2007, : 197 - +