A time-based key management protocol for wireless sensor networks

Research output: Chapter in Book/Report/Conference proceedingConference contribution

32 Citations (Scopus)

Abstract

It is not easy to achieve secure key establishment in wireless sensor networks without public key cryptography. Many key management protocols have been proposed for the purpose. Among them, LEAP is a simple and elegant protocol that establishes multi-level keys in an efficient way, but its security mainly relies on that of a single initialization key. Though it is assumed that the initial deployment phase is secure and the key is erased from sensor nodes after the initialization in LEAP, the assumption could not be viable for two reasons. First, the same key should be used again for node addition after the initialization phase whereas the new node can be captured before removing the key. Second, the initial deployment of dense networks may not take short as LEAP expected in many cases. This paper rethinks the security of LEAP and proposes a more secure scheme with a new notion of probabilistic time intervals. Rather we localize the impact of key compromise within the time intervals.

Original languageEnglish
Title of host publicationInformation Security Practice and Experience - Third International Conference, ISPEC 2007, Proceedings
Pages314-328
Number of pages15
Publication statusPublished - 2007 Dec 20
Event3rd International Conference on Information Security Practice and Experience, ISPEC 2007 - Hong Kong, Hong Kong
Duration: 2007 May 72007 May 9

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4464 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other3rd International Conference on Information Security Practice and Experience, ISPEC 2007
CountryHong Kong
CityHong Kong
Period07/5/707/5/9

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'A time-based key management protocol for wireless sensor networks'. Together they form a unique fingerprint.

  • Cite this

    Jang, J., Kwon, T., & Song, J. (2007). A time-based key management protocol for wireless sensor networks. In Information Security Practice and Experience - Third International Conference, ISPEC 2007, Proceedings (pp. 314-328). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 4464 LNCS).