Providing perfect forward secrecy for location-aware wireless sensor networks

被引:0
|
作者
Chi-Tung Chen
Shu-Yan Huang
Iuon-Chang Lin
机构
[1] National Chin-Yi University of Technology,Department of Distribution Management
[2] National Chung Hsing University,Department of Management Information Systems
[3] Aisa University,Department of Photonics and Communication Engineering
关键词
Wireless sensor network; Key management; Perfect forward secrecy;
D O I
暂无
中图分类号
学科分类号
摘要
Sensor nodes are resource-constrained, such as low battery life, computation, bandwidth and memory, so traditional public key schemes are impractical in wireless sensor networks. In the previous schemes, symmetric cryptography is the most common method used in sensor nodes. How to distribute keys into every sensor node is an important issue in many applications for hierarchical sensor networks. Once adversaries compromise a sensor node, they can obtain all information from the sensor’s memory, such as keying material. The revocation of compromised sensor nodes is also a necessary but troublesome operation. These compromised sensor nodes may lead to the compromise of the entire network. In this article, we present an efficient approach to establish security links between each sensor node/cluster head and its neighbor/member. Our scheme only requires small memory size for each cluster head and sensor node, and it can also ensure perfect forward secrecy via changing session key in every transmission.
引用
收藏
相关论文
共 50 条
  • [41] Enabling location-aware quality-controlled access in wireless networks
    Hwangnam Kim
    Hyun Soon Kim
    Suk Kyu Lee
    Eun-Chan Park
    Kyung-Joon Park
    [J]. EURASIP Journal on Wireless Communications and Networking, 2011
  • [42] Enabling location-aware quality-controlled access in wireless networks
    Kim, Hwangnam
    Kim, Hyun Soon
    Lee, Suk Kyu
    Park, Eun-Chan
    Park, Kyung-Joon
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2011,
  • [43] Location-Aware Transmission for Two-Cell Wireless Networks With Caching
    Jiang, Bin
    Zheng, Fu-Chun
    Peng, Tong
    Burr, Alister G.
    Fitch, Mike
    [J]. IEEE ACCESS, 2020, 8 : 170769 - 170778
  • [44] User Location-Aware Video Delivery over Wireless Mesh Networks
    Le-Dang, Quang
    McManis, Jennifer
    Muntean, Gabriel-Miro
    [J]. 2013 IEEE INTERNATIONAL SYMPOSIUM ON BROADBAND MULTIMEDIA SYSTEMS AND BROADCASTING (BMSB), 2013,
  • [45] Location-Aware Chord-Based Overlay for Wireless Mesh Networks
    Quang Le-Dang
    McManis, Jennifer
    Muntean, Gabriel-Miro
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2014, 63 (03) : 1378 - 1387
  • [46] Processing k nearest neighbor queries in location-aware sensor networks
    Xu, Yingqi
    Fu, Tao-Yang
    Lee, Wang-Chien
    Winter, Julian
    [J]. SIGNAL PROCESSING, 2007, 87 (12) : 2861 - 2881
  • [47] Location-aware combinatorial key management scheme for clustered sensor networks
    Younis, Mohamed F.
    Ghumman, Kajaldeep
    Eltoweissy, Mohamed
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2006, 17 (08) : 865 - 882
  • [48] Energy efficient location-aware networks
    Shen, Yuan
    Win, Moe Z.
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 2995 - 3001
  • [49] Location-Aware Computing, Virtual Networks
    Ackerman, Mark S.
    Dong, Too
    Gifford, Scott
    Kim, Jungwoo
    Newman, Mark W.
    Prakash, Atul
    Qidwai, Sarah
    Garcia, David
    Villegas, Paulo
    Cadenas, Alejandro
    Sanchez-Esguevillas, Antonio
    Aguiar, Javier
    Carro, Belen
    Mailander, Sean
    Schroeter, Ronald
    Foth, Marcus
    Hattacharya, Amiya
    Dasgupta, Partha
    [J]. IEEE PERVASIVE COMPUTING, 2009, 8 (04) : 28 - 32
  • [50] A Dynamic Location aware Mechanism for Wireless Sensor Networks
    Santhi, C.
    Sharmila, D.
    [J]. 2014 INTERNATIONAL CONFERENCE ON ELECTRONICS AND COMMUNICATION SYSTEMS (ICECS), 2014,