Yoon-Su Jeong, Ki-Soo Kim, Yong-Tae Kim, Gil-Cheol Park, Sang-ho Lee
{"title":"一种保证无线传感器网络中间节点稳定性的密钥管理协议","authors":"Yoon-Su Jeong, Ki-Soo Kim, Yong-Tae Kim, Gil-Cheol Park, Sang-ho Lee","doi":"10.1109/CIT.2008.WORKSHOPS.28","DOIUrl":null,"url":null,"abstract":"Recent development of sensor and computer technology enabled WSNs (wireless sensor networks) to be expanded. To conserve power from each sensor, intermediate nodes should aggregate results from individual sensors. However, it can make it that a single compromised sensor can render the network useless, or worse, mislead the operator into trusting a false reading. In this paper, we propose a protocol to give us a key aggregation mechanism that intermediate nodes could aggregate data more safely. The proposed protocol is more helpful at multi-tier network architecture in secure sessions established between sensor nodes and gateways. In simulation result, since the proposed scheme distributed key management role to an internal node to avoid parent node's concentrated management, it has 3.5% lower energy consumption load caused by key management; 0.3% and 0.6% more improved key transmission time and process time, respectively, compared with LHA-SP.","PeriodicalId":155998,"journal":{"name":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"A Key Management Protocol for Securing Stability of an Intermediate Node in Wireless Sensor Networks\",\"authors\":\"Yoon-Su Jeong, Ki-Soo Kim, Yong-Tae Kim, Gil-Cheol Park, Sang-ho Lee\",\"doi\":\"10.1109/CIT.2008.WORKSHOPS.28\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recent development of sensor and computer technology enabled WSNs (wireless sensor networks) to be expanded. To conserve power from each sensor, intermediate nodes should aggregate results from individual sensors. However, it can make it that a single compromised sensor can render the network useless, or worse, mislead the operator into trusting a false reading. In this paper, we propose a protocol to give us a key aggregation mechanism that intermediate nodes could aggregate data more safely. The proposed protocol is more helpful at multi-tier network architecture in secure sessions established between sensor nodes and gateways. In simulation result, since the proposed scheme distributed key management role to an internal node to avoid parent node's concentrated management, it has 3.5% lower energy consumption load caused by key management; 0.3% and 0.6% more improved key transmission time and process time, respectively, compared with LHA-SP.\",\"PeriodicalId\":155998,\"journal\":{\"name\":\"2008 IEEE 8th International Conference on Computer and Information Technology Workshops\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-07-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 IEEE 8th International Conference on Computer and Information Technology Workshops\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIT.2008.WORKSHOPS.28\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE 8th International Conference on Computer and Information Technology Workshops","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIT.2008.WORKSHOPS.28","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Key Management Protocol for Securing Stability of an Intermediate Node in Wireless Sensor Networks
Recent development of sensor and computer technology enabled WSNs (wireless sensor networks) to be expanded. To conserve power from each sensor, intermediate nodes should aggregate results from individual sensors. However, it can make it that a single compromised sensor can render the network useless, or worse, mislead the operator into trusting a false reading. In this paper, we propose a protocol to give us a key aggregation mechanism that intermediate nodes could aggregate data more safely. The proposed protocol is more helpful at multi-tier network architecture in secure sessions established between sensor nodes and gateways. In simulation result, since the proposed scheme distributed key management role to an internal node to avoid parent node's concentrated management, it has 3.5% lower energy consumption load caused by key management; 0.3% and 0.6% more improved key transmission time and process time, respectively, compared with LHA-SP.