Key Management for Static Wireless Sensor Networks With Node Adding
Title | Key Management for Static Wireless Sensor Networks With Node Adding |
Publication Type | Journal Article |
Year of Publication | 2014 |
Authors | Gandino, F., Montrucchio, B., Rebaudengo, M. |
Journal | Industrial Informatics, IEEE Transactions on |
Volume | 10 |
Pagination | 1133-1143 |
Date Published | May |
ISSN | 1551-3203 |
Keywords | cryptographic protocols, cryptography, eavesdropping, hardware tampering, Informatics, Key Management, Knowledge engineering, Materials, protocol, Protocols, random key distribution, random processes, random seed distribution, secure communication, security threat, static wireless sensor network, symmetric encryption, symmetric key management scheme, telecommunication network management, telecommunication security, transitory master key, Wireless sensor networks, wireless sensor networks (WSNs) |
Abstract | Wireless sensor networks offer benefits in several applications but are vulnerable to various security threats, such as eavesdropping and hardware tampering. In order to reach secure communications among nodes, many approaches employ symmetric encryption. Several key management schemes have been proposed in order to establish symmetric keys. The paper presents an innovative key management scheme called random seed distribution with transitory master key, which adopts the random distribution of secret material and a transitory master key used to generate pairwise keys. The proposed approach addresses the main drawbacks of the previous approaches based on these techniques. Moreover, it overperforms the state-of-the-art protocols by providing always a high security level. |
URL | http://ieeexplore.ieee.org/document/6651779/ |
DOI | 10.1109/TII.2013.2288063 |
Citation Key | 6651779 |
- random processes
- wireless sensor networks (WSNs)
- wireless sensor networks
- transitory master key
- telecommunication security
- telecommunication network management
- symmetric key management scheme
- symmetric encryption
- static wireless sensor network
- security threat
- secure communication
- random seed distribution
- Cryptographic Protocols
- random key distribution
- Protocols
- protocol
- Materials
- Knowledge engineering
- key management
- Informatics
- hardware tampering
- eavesdropping
- Cryptography