TY - GEN
T1 - A key management scheme based on random key distribution for clustered wireless sensor networks
AU - Kausar, Firdous
AU - Masood, Ashraf
PY - 2007
Y1 - 2007
N2 - Advances in technology introduce new application areas for wireless sensor networks (WSNs). Foreseeable wide deployment of mission critical sensor networks creates concerns on security issues because they are more vulnerable to attacks due to broadcast nature of transmission medium, resource limitation on sensor nodes and uncontrolled environments where they are left unattended. The most critical security requirements in WSNs include authentication and confidentiality .These security requirements can be provided by a key management but it is difficult due to the adhoc nature, intermittent connectivity, and resource limitations of the sensor networks .In this paper we proposed a key management scheme for clustered wireless sensor networks based on the random key distribution. Our analysis of this scheme shows that it is more resilient to node capture as compared to other random key distribution schemes. It also provide global and continuous authentication of each entity in the network and multiple level of encryption.
AB - Advances in technology introduce new application areas for wireless sensor networks (WSNs). Foreseeable wide deployment of mission critical sensor networks creates concerns on security issues because they are more vulnerable to attacks due to broadcast nature of transmission medium, resource limitation on sensor nodes and uncontrolled environments where they are left unattended. The most critical security requirements in WSNs include authentication and confidentiality .These security requirements can be provided by a key management but it is difficult due to the adhoc nature, intermittent connectivity, and resource limitations of the sensor networks .In this paper we proposed a key management scheme for clustered wireless sensor networks based on the random key distribution. Our analysis of this scheme shows that it is more resilient to node capture as compared to other random key distribution schemes. It also provide global and continuous authentication of each entity in the network and multiple level of encryption.
KW - Node to node authentication
KW - Random key distribution
KW - Security
KW - Wirless sensor networks
UR - http://www.scopus.com/inward/record.url?scp=84888378838&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84888378838&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:84888378838
SN - 9789889867171
T3 - Lecture Notes in Engineering and Computer Science
SP - 1395
EP - 1400
BT - IMECS 2007 - International MultiConference of Engineers and Computer Scientists 2007
T2 - International MultiConference of Engineers and Computer Scientists 2007, IMECS 2007
Y2 - 21 March 2007 through 23 March 2007
ER -