scispace - formally typeset
Proceedings ArticleDOI

An effective key management scheme for mobile heterogeneous sensor networks

Reads0
Chats0
TLDR
The analytical and OMNET++ simulation results of the proposed scheme shows that it provides better network connectivity, consume less memory and has better network resilience against attacks.
Abstract
The use of Wireless Sensor Networks (WSNs) has got great importance in many applications ranging from home and industrial applications to more sensitive military applications. In mobility context, such applications introduce new technological challenges for security. The resource constrained devices should be protected from various security attacks and provided with secure data communication. To this aim, a proper key management scheme supporting node mobility is required. In this paper, we present an effective key management scheme that can support node mobility in the heterogeneous sensor networks that consists of mobile sensor nodes with few fixed sensor nodes. The analytical and OMNET++ simulation results of our proposed scheme shows that it provides better network connectivity, consume less memory and has better network resilience against attacks.

read more

Citations
More filters
Proceedings ArticleDOI

An energy and memory-efficient key management scheme for mobile heterogeneous sensor networks

TL;DR: This paper presents an effective mutual authentication and key establishment scheme for heterogeneous sensor networks consisting of numerous mobile sensor nodes and only a few more powerful fixed sensor nodes that assures better network connectivity, consumes less memory, has low communication overhead during the authentication andKey establishment phase and has better network resilience against mobile nodes attacks.
Journal ArticleDOI

An Authentication and Key Establishment Scheme for the IP-Based Wireless Sensor Networks

TL;DR: This paper presents an efficient and secure mutual authentication and key establishment protocol based on Elliptic Curve Cryptography (ECC) by which difierent classes of nodes can authenticate each other and establish a secret key for secure communication.
Journal ArticleDOI

Privacy-preserving data aggregation in two-tiered wireless sensor networks with mobile nodes.

TL;DR: This paper focuses on the SUM aggregation function and proposes two privacy-preserving data aggregation protocols for two-tiered sensor networks with mobile nodes: PDAAS and PDACAS, which can protect the privacy of sensor nodes even the aggregator and the sink collude, at the cost of a little more overhead.
Journal ArticleDOI

Online Authentication and Key Establishment Scheme for Heterogeneous Sensor Networks

TL;DR: This paper presents an authentication and key management scheme supporting node mobility in a heterogeneous WSN that consists of several mobile sensor nodes and a few fixed sensor nodes that requires less memory space and provides better connectivity and network resilience against node capture attacks compared to some existing schemes.
Journal ArticleDOI

Energy-aware Key Management in Mobile Wireless Sensor Networks

TL;DR: Based on the Group Diffie-Hellman key agreement protocols and the energy level of each node in the network, a key management protocol for mobile wireless sensor networks is proposed.
References
More filters
Journal ArticleDOI

The capacity of wireless networks

TL;DR: When n identical randomly located nodes, each capable of transmitting at W bits per second and using a fixed range, form a wireless network, the throughput /spl lambda/(n) obtainable by each node for a randomly chosen destination is /spl Theta/(W//spl radic/(nlogn)) bits persecond under a noninterference protocol.
Proceedings ArticleDOI

A key-management scheme for distributed sensor networks

TL;DR: A key-management scheme designed to satisfy both operational and security requirements of DSNs is presented, which relies on probabilistic key sharing among the nodes of a random graph and uses simple protocols for shared-key discovery and path-key establishment, and for key revocation, re-keying, and incremental addition of nodes.
Proceedings ArticleDOI

Random key predistribution schemes for sensor networks

TL;DR: The random-pairwise keys scheme is presented, which perfectly preserves the secrecy of the rest of the network when any node is captured, and also enables node-to-node authentication and quorum-based revocation.

Digitalized signatures and public-key functions as intractable as factorization

TL;DR: It is proved that for any given n, if the authors can invert the function y = E (x1) for even a small percentage of the values y then they can factor n, which seems to be the first proved result of this kind.
Book ChapterDOI

Perfectly-Secure Key Distribution for Dynamic Conferences

TL;DR: This paper considers the model where interaction is allowed in the common key computation phase, and shows a gap between the models by exhibiting an interactive scheme in which the user's information is only k + t - 1 times the size of the commonKey.
Related Papers (5)