{"title":"An efficient key management scheme in hierarchical sensor networks","authors":"Xiao Chen, J. Drissi","doi":"10.1109/MAHSS.2005.1542880","DOIUrl":null,"url":null,"abstract":"Recent advances in micro-electro-mechanical systems technology, wireless communications and digital electronics have enabled the development of sensor networks, in which a large number of sensor nodes collaborate to monitor certain environment. Many applications are dependent on the security of sensor networks, and have serious consequences if the network is compromised or disrupted. In sensor networks, plaintext is encrypted by keys before it is sent to the destination. Therefore key management is essential to any secure communication. Depending on the application, sensor networks can be very different so as the key management protocols. In this paper, we study the key management scheme for sensor networks with hierarchical structures such as the situation in the military or some government organizations. Analysis is conducted to show the effectiveness of the scheme by taking advantage of the topology. So far to our knowledge, no other paper has discussed the key management scheme in a hierarchical sensor network","PeriodicalId":268267,"journal":{"name":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"27","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MAHSS.2005.1542880","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 27
Abstract
Recent advances in micro-electro-mechanical systems technology, wireless communications and digital electronics have enabled the development of sensor networks, in which a large number of sensor nodes collaborate to monitor certain environment. Many applications are dependent on the security of sensor networks, and have serious consequences if the network is compromised or disrupted. In sensor networks, plaintext is encrypted by keys before it is sent to the destination. Therefore key management is essential to any secure communication. Depending on the application, sensor networks can be very different so as the key management protocols. In this paper, we study the key management scheme for sensor networks with hierarchical structures such as the situation in the military or some government organizations. Analysis is conducted to show the effectiveness of the scheme by taking advantage of the topology. So far to our knowledge, no other paper has discussed the key management scheme in a hierarchical sensor network