Abstract
Wireless sensor networks are emerging as a promising solution for various types of futuristic applications for both military and the public. The design of key management schemes is one of the most important aspects and basic research field of secure wireless sensor networks. Efficient key management could guarantee authenticity and confidentiality of the data exchanged among the nodes in the network. In this paper, we propose a new key management scheme based on loop topology. Comparing with cluster-based key management schemes, loop-based scheme is proved to be more efficient, cost-saving and safe.
Chapter PDF
References
Carman, D.W., Kruus, P.S., Matt, B.J.: Constraints and approaches for distributed sensor network security. Technical Report #00-010, NAI Labs (2000)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: The 9th ACM conference on Computer and Communications, Washington, DC, USA, November 18-22, pp. 41–47 (2002)
Chan, H., Perrig, A., Song, D.: Random key pre-distribution schemes for sensor networks. In: Proc. 2003 IEEE Symposium on Security and Privacy, May 11-14, pp. 197–213 (2003)
Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: ACM Conference on Computer and Communications Security, pp. 52–61 (2003)
Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: INFOCOM 2004, vol. 1, pp. 586–597 (March 7-11, 2004)
Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. ACM Transactions on Information and System Security 8(2), 228–258 (2005)
Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)
Choi, S., Youn, H.: An Efficient Key Pre-distribution Scheme for Secure Distributed Sensor Networks. In: EUC 2005. LNCS, vol. 3823, pp. 1088–1097. Springer, Heidelberg (2005)
Li, Y., Wang, X., Baueregger, F., Xue, X., Toh, C.K.: Loop-Based Topology Maintenance in Wireless Sensor Networks. In: Lu, X., Zhao, W. (eds.) ICCNMC 2005. LNCS, vol. 3619, Springer, Heidelberg (2005)
Blundo, C., Santix, A D, Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: The 12th Annual International Cryptology Conference on Advances in Cryptology, pp. 471–486. Springer, Berlin (1992)
Vlajic, N., Xia, D.: Wireless Sensor Networks: To Cluster or Not To Cluster? In: IEEE International Symposium on WoWMoM 2006, Niagara-Falls, Buffalo-NY, USA (June 2006)
Chorzempa, M., Park, J.-M., Eltoweissy, M.: SECK: survivable and efficient clustered keying for wireless sensor networks. In: IPCCC 2005 (2005)
Younis, M.F., Ghumman, K., Eltoweissy, M.: Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks. Parallel and Distributed Systems, IEEE Transactions 17(8), 865–882 (2006)
Lin, L., Ru-chuan, W., Bo, J., Hai-ping, H.: Research of Layer-Cluster Key Management Scheme on Wireless Sensor Networks. Journal of Electronics & Information Technology 28(12) (December 2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zeng, Y., Zhao, B., Su, J., Yan, X., Shao, Z. (2007). A Loop-Based Key Management Scheme for Wireless Sensor Networks. In: Denko, M.K., et al. Emerging Directions in Embedded and Ubiquitous Computing. EUC 2007. Lecture Notes in Computer Science, vol 4809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77090-9_10
Download citation
DOI: https://doi.org/10.1007/978-3-540-77090-9_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77089-3
Online ISBN: 978-3-540-77090-9
eBook Packages: Computer ScienceComputer Science (R0)