An efficient and scalable key management mechanism for wireless sensor networks
Title | An efficient and scalable key management mechanism for wireless sensor networks |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Abdallah, W., Boudriga, N., Daehee Kim, Sunshin An |
Conference Name | Advanced Communication Technology (ICACT), 2014 16th International Conference on |
Date Published | Feb |
Keywords | Base stations, battery-based power supply, Diffie-Hellman like key exchange, Elliptic curve cryptography, elliptic curve public key encryption, Elliptic curves, encryption keys, group communications, key distribution schemes, Key Management, large size networks, limited computation capability, Network topology, processing overheads, Public key, public key cryptography, reduced memory size, scalable key management mechanism, secret sharing techniques, secure wireless sensor networks, security, sensor nodes, Sensors, telecommunication network management, telecommunication network topology, telecommunication security, Wireless sensor networks |
Abstract | A major issue to secure wireless sensor networks is key distribution. Current key distribution schemes are not fully adapted to the tiny, low-cost, and fragile sensors with limited computation capability, reduced memory size, and battery-based power supply. This paper investigates the design of an efficient key distribution and management scheme for wireless sensor networks. The proposed scheme can ensure the generation and distribution of different encryption keys intended to secure individual and group communications. This is performed based on elliptic curve public key encryption using Diffie-Hellman like key exchange and secret sharing techniques that are applied at different levels of the network topology. This scheme is more efficient and less complex than existing approaches, due to the reduced communication and processing overheads required to accomplish key exchange. Furthermore, few keys with reduced sizes are managed in sensor nodes which optimizes memory usage, and enhances scalability to large size networks. |
URL | http://ieeexplore.ieee.org/document/6779051/ |
DOI | 10.1109/ICACT.2014.6779051 |
Citation Key | 6779051 |
- processing overheads
- wireless sensor networks
- telecommunication security
- telecommunication network topology
- telecommunication network management
- sensors
- sensor nodes
- security
- secure wireless sensor networks
- secret sharing techniques
- scalable key management mechanism
- reduced memory size
- public key cryptography
- Public key
- Base stations
- network topology
- limited computation capability
- large size networks
- key management
- key distribution schemes
- group communications
- encryption keys
- Elliptic curves
- elliptic curve public key encryption
- Elliptic curve cryptography
- Diffie-Hellman like key exchange
- battery-based power supply