Abstract
Wireless sensor networks hold the promise of facilitating large-scale, real-time data processing in complex environments. As sensor networks edge closer towards widespread deployment, security issues become a central concern. Key management in wireless sensor networks is a challenging problem. Computationally complex asymmetric crypto techniques are unsuitable for use in resource-constrained sensor nodes and use of symmetric cryptography makes the entire network vulnerable in the event of node compromise. This paper presents a key management scheme that satisfies both operational and security requirements of distributed wireless sensor networks. The proposed scheme accommodates other techniques like data aggregation for energy efficiency and watchdog mechanism for intrusion monitoring. Also, the proposed scheme is generic enough so that it can be applied to variety of sensor network protocols.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on Sensor Networks. IEEE Communication Magazine, 102–114 (August 2002)
Crossbow Technology, Inc., http://www.xbow.com
Karlof, C., Sastry, N., Shankar, U., Wagner, D.: TinySec: TinyOS Link Layer Security Proposal (July 2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, YH., Phadke, V., Deshmukh, A., Lee, J.W. (2005). Key Management in Wireless Sensor Networks. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds) Security in Ad-hoc and Sensor Networks. ESAS 2004. Lecture Notes in Computer Science, vol 3313. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30496-8_16
Download citation
DOI: https://doi.org/10.1007/978-3-540-30496-8_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24396-0
Online ISBN: 978-3-540-30496-8
eBook Packages: Computer ScienceComputer Science (R0)