Skip to main content

Key Establishment Between Heterogenous Nodes in Wireless Sensor and Actor Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3842))

Abstract

WSAN (Wireless Sensor and Actor Network) has become a promising direction in research. However, up to now, little work has been done in WSAN, especially in security issues. In this paper, we first discuss several challenges in security of WSAN. Aiming at these challenges, we propose our key establishment scheme for heterogeneous nodes in WSAN. In our scheme, authentication and key establishment can be finished with just one round-trip communication. Further more, our scheme is especially designed for heterogeneous architectures. Capability of resource-rich actors are fully used. Finally, our scheme and existing schemes for Ad Hoc Networks and WSN (Wireless Sensor Network) are compared and analyzed.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Kasimoglu, I.H.: Wireless sensor and actor networks: research challenges. Ad hoc networks 2 (2004) (2004)

    Google Scholar 

  2. Hu, F., Cao, X.: Security in Wireless Actor & Sensor Networks (WASN): Towards A Hierarchical Re-Keying Design. ITCC (2) (2005)

    Google Scholar 

  3. Akyildiz, I.F., Pompili, D., Melodia, T.: Underwater Acoustic Sensor Networks: Research Challenges. Elsevier’s Journal of Ad Hoc Networks 3(3), 257–279 (2005)

    Article  Google Scholar 

  4. Durresi, A., Durresi, M., Barolli, L.: Sensor Inter-vehicle Communication for Safer Highways. In: Proc. of the First International Workshop on Ubiquitous Smart Worlds, USW 2005 (2005)

    Google Scholar 

  5. Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119–132. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Watro, R., Kong, D., Fen Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: TinyPK: Securing Sensor Networks with Public Key Technology. In: Proc. of ACM SASN (2004)

    Google Scholar 

  7. Du, W., Wang, R., Ning, P.: An Efficient Scheme for Authenticating Public Keys in Sensor Networks. In: Proc. of The 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc (2005)

    Google Scholar 

  8. Eschenauer, L., Gligor, V.: A Key-Management Scheme for Distributed Sensor Networks. In: Proc. of ACM CCS (2002)

    Google Scholar 

  9. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor net-works. In: Proc. of Symposium on Security and Privacy (2003)

    Google Scholar 

  10. Huang, D., Mehta, M., Medhi, D., Harn, L.: Location-aware Key Management Scheme for Wireless Sensor Networks. In: Proc. of ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2004 (2004)

    Google Scholar 

  11. Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In: Proc. of IEEE Infocom 2004 (2004)

    Google Scholar 

  12. Zhou, L., Haas, Z.J.: Securing Adhoc Networks. IEEE Network Magazine 13(6), 24–30 (1999)

    Article  Google Scholar 

  13. Capkun, S., Buttyan, L., Hubaux, J.P.: Self-Organized PublicKey Management for Mobile Ad Hoc Networks. IEEE Trans. Mobile Computing 2(1), 52–64 (2003)

    Article  Google Scholar 

  14. Bechler, M., Hof, H.-J., Kraft, D., Pahlke, F., Wolf, L.: A Cluster-Based Security Architecture for Ad Hoc Networks. In: Proc. of IEEE Infocom 2004 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yu, B., Ma, J., Wang, Z., Mao, D., Gao, C. (2006). Key Establishment Between Heterogenous Nodes in Wireless Sensor and Actor Networks. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds) Advanced Web and Network Technologies, and Applications. APWeb 2006. Lecture Notes in Computer Science, vol 3842. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11610496_25

Download citation

  • DOI: https://doi.org/10.1007/11610496_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-31158-4

  • Online ISBN: 978-3-540-32435-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics