4.7 Article

A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks

Journal

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
Volume 8, Issue 3, Pages 1223-1229

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TWC.2009.060598

Keywords

Security; key management; sensor networks; elliptic curve cryptography

Funding

  1. US National Science Foundation (NSF) [CNS-0721907, CNS-0709268]
  2. Army Research Office [W911NF-07-1-0250, W911NF-08-1-0334]
  3. Direct For Computer & Info Scie & Enginr
  4. Division Of Computer and Network Systems [0963578] Funding Source: National Science Foundation
  5. Division Of Computer and Network Systems
  6. Direct For Computer & Info Scie & Enginr [1002974] Funding Source: National Science Foundation

Ask authors/readers for more resources

Previous research on sensor network security mainly considers homogeneous sensor networks, where all sensor nodes have the same capabilities. Research has shown that homogeneous ad hoc networks have poor performance and scalability. The many-to-one traffic pattern dominates in sensor networks, and hence a sensor may only communicate with a small portion of its neighbors. Key management is a fundamental security operation. Most existing key management schemes try to establish shared keys for all pairs of neighbor sensors, no matter whether these nodes communicate with each other or not, and this causes large overhead. In this paper, we adopt a Heterogeneous Sensor Network (HSN) model for better performance and security. We propose a novel routing-driven key management scheme, which only establishes shared keys for neighbor sensors that communicate with each other. We utilize Elliptic Curve Cryptography In the design of an efficient key management scheme for sensor nodes. The performance evaluation and security analysis show that our key management scheme can provide better security with significant reductions on communication overhead, storage space and energy consumption than other key management schemes.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available