A Dynamic Key Management Scheme Based on Secret Sharing for Hierarchical Wireless Sensor Networks

Since wireless sensor networks (WSN for short) are often deployed in hostile environments in many applications, security becomes one of the critical issues in WSN. Moreover, due to the limitation of the sensor nodes, traditional key management schemes are not suitable for it. Thereby,a feasible and...

Full description

Saved in:
Bibliographic Details
Main Authors: Bai, Enjian (Author), Jiang, Xueqin (Author)
Format: EJournal Article
Published: Institute of Advanced Engineering and Science, 2013-03-01.
Subjects:
Online Access:Get fulltext
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02302 am a22002773u 4500
001 ijeecs2120_2604
042 |a dc 
100 1 0 |a Bai, Enjian  |e author 
100 1 0 |e contributor 
700 1 0 |a Jiang, Xueqin  |e author 
245 0 0 |a A Dynamic Key Management Scheme Based on Secret Sharing for Hierarchical Wireless Sensor Networks 
260 |b Institute of Advanced Engineering and Science,   |c 2013-03-01. 
520 |a Since wireless sensor networks (WSN for short) are often deployed in hostile environments in many applications, security becomes one of the critical issues in WSN. Moreover, due to the limitation of the sensor nodes, traditional key management schemes are not suitable for it. Thereby,a feasible and efficient key management scheme is an important guarantee for WSN to communicate securely. For the moment, many protocols have been proposed and each has its own advantages. However, these protocols cannot provide sufficient security in many cases, such as node capture attack, which makes WSN more vulnerable than traditional wireless networks. Key protection and revocation issues must be considered with special attention in WSN. To address these two issues, we propose a dynamically clustering key management scheme based on secret sharing for WSN. The scheme combined the hierarchical structure of wireless sensor networks with dynamic key management scheme. The analysis results show that the scheme has strong security and resistance of captured attack, as well as low communicational overhead, and it well meets the requirement of scalability. DOI: http://dx.doi.org/10.11591/telkomnika.v11i3.2300 
540 |a Copyright (c) 2013 Institute of Advanced Engineering and Science 
540 |a http://creativecommons.org/licenses/by-nc-nd/4.0 
546 |a eng 
690
655 7 |a info:eu-repo/semantics/article  |2 local 
655 7 |a info:eu-repo/semantics/publishedVersion  |2 local 
655 7 |2 local 
786 0 |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 11, No 3: March 2013; 1514-1523 
786 0 |n 2502-4760 
786 0 |n 2502-4752 
786 0 |n 10.11591/ijeecs.v11.i3 
787 0 |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2120/2604 
856 4 1 |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/2120/2604  |z Get fulltext