{"title":"Pairwise Key Management Scheme Using Sub Key Pool for Wireless Sensor Networks","authors":"Jianmin Zhang, Yu Ding","doi":"10.1109/ITCS.2010.13","DOIUrl":null,"url":null,"abstract":"Key management in sensor networks has become a challenging issue in the design and the development of secure wireless sensor networks since asymmetric cryptosystems are unsuitable for use in resource constrained sensor nodes, and also because the nodes are vulnerable to physical capture. In this paper, we present a new key management scheme using sub key pool to enlarge the size of key pool. With the more keys in the key pool, this scheme has higher security against node capture. The analysis shows that this scheme provides better security compared to the previous approaches, and can ensure reasonable connectivity at the same time.","PeriodicalId":340471,"journal":{"name":"2010 Second International Conference on Information Technology and Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 Second International Conference on Information Technology and Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITCS.2010.13","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Key management in sensor networks has become a challenging issue in the design and the development of secure wireless sensor networks since asymmetric cryptosystems are unsuitable for use in resource constrained sensor nodes, and also because the nodes are vulnerable to physical capture. In this paper, we present a new key management scheme using sub key pool to enlarge the size of key pool. With the more keys in the key pool, this scheme has higher security against node capture. The analysis shows that this scheme provides better security compared to the previous approaches, and can ensure reasonable connectivity at the same time.