Abstract
Wireless sensor networks hold the promise of facilitating large-scale, real-time data processing in complex environments. As sensor networks edge closer towards widespread deployment, security issues become a central concern. Key management in wireless sensor networks is a challenging problem. Computationally complex asymmetric crypto techniques are unsuitable for use in resource-constrained sensor nodes and use of symmetric cryptography makes the entire network vulnerable in the event of node compromise. This paper presents a key management scheme that satisfies both operational and security requirements of distributed wireless sensor networks. The proposed scheme accommodates other techniques like data aggregation for energy efficiency and watch-dog mechanism for intrusion monitoring. Also, the proposed scheme is generic enough so that it can be applied to variety of sensor network protocols.
| Original language | English (US) |
|---|---|
| Title of host publication | Lecture Notes in Computer Science |
| Editors | C. Castelluccia, H. Hartenstein, C. Paar, D. Westhoff |
| Pages | 190-204 |
| Number of pages | 15 |
| Volume | 3313 |
| State | Published - 2005 |
| Event | First European Workshop, ESAS 2004 - Heidelberg, Germany Duration: Aug 6 2004 → Aug 6 2004 |
Other
| Other | First European Workshop, ESAS 2004 |
|---|---|
| Country/Territory | Germany |
| City | Heidelberg |
| Period | 8/6/04 → 8/6/04 |
ASJC Scopus subject areas
- Computer Science (miscellaneous)
Fingerprint
Dive into the research topics of 'Key management in wireless sensor networks'. Together they form a unique fingerprint.Cite this
- APA
- Standard
- Harvard
- Vancouver
- Author
- BIBTEX
- RIS