An enhanced key management scheme based on key infection in wireless sensor networks

Han Park, Joo Seok Song

Research output: Contribution to journalArticle

5 Citations (Scopus)

Abstract

We propose an enhanced key management scheme based on Key Infection, which is lightweight scheme for tiny sensors. The basic scheme, Key Infection, is perfectly secure against node capture and eavesdropping if initial communications after node deployment is secure. If, however, an attacker can eavesdrop on the initial communications, they can take the session key. We use common neighbors for each node to generate the session key. Each node has own secret key and shares it with its neighbor nodes. Then each node can establish the session key using common neighbors' secret keys and a random number. Our scheme needs only a few communications even if it uses neighbor nodes' information. Without losing the lightness of basic scheme, it improves the resistance against eavesdropping on the initial communications more than 30%.

Original languageEnglish
Pages (from-to)249-254
Number of pages6
JournalWorld Academy of Science, Engineering and Technology
Volume36
Publication statusPublished - 2009 Dec 1

Fingerprint

Wireless sensor networks
Communication
Sensors

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Cite this

@article{0a65a374ef234afbafdb6318016744cc,
title = "An enhanced key management scheme based on key infection in wireless sensor networks",
abstract = "We propose an enhanced key management scheme based on Key Infection, which is lightweight scheme for tiny sensors. The basic scheme, Key Infection, is perfectly secure against node capture and eavesdropping if initial communications after node deployment is secure. If, however, an attacker can eavesdrop on the initial communications, they can take the session key. We use common neighbors for each node to generate the session key. Each node has own secret key and shares it with its neighbor nodes. Then each node can establish the session key using common neighbors' secret keys and a random number. Our scheme needs only a few communications even if it uses neighbor nodes' information. Without losing the lightness of basic scheme, it improves the resistance against eavesdropping on the initial communications more than 30{\%}.",
author = "Han Park and Song, {Joo Seok}",
year = "2009",
month = "12",
day = "1",
language = "English",
volume = "36",
pages = "249--254",
journal = "World Academy of Science, Engineering and Technology",
issn = "2010-376X",
publisher = "World Academy of Science Engineering and Technology",

}

An enhanced key management scheme based on key infection in wireless sensor networks. / Park, Han; Song, Joo Seok.

In: World Academy of Science, Engineering and Technology, Vol. 36, 01.12.2009, p. 249-254.

Research output: Contribution to journalArticle

TY - JOUR

T1 - An enhanced key management scheme based on key infection in wireless sensor networks

AU - Park, Han

AU - Song, Joo Seok

PY - 2009/12/1

Y1 - 2009/12/1

N2 - We propose an enhanced key management scheme based on Key Infection, which is lightweight scheme for tiny sensors. The basic scheme, Key Infection, is perfectly secure against node capture and eavesdropping if initial communications after node deployment is secure. If, however, an attacker can eavesdrop on the initial communications, they can take the session key. We use common neighbors for each node to generate the session key. Each node has own secret key and shares it with its neighbor nodes. Then each node can establish the session key using common neighbors' secret keys and a random number. Our scheme needs only a few communications even if it uses neighbor nodes' information. Without losing the lightness of basic scheme, it improves the resistance against eavesdropping on the initial communications more than 30%.

AB - We propose an enhanced key management scheme based on Key Infection, which is lightweight scheme for tiny sensors. The basic scheme, Key Infection, is perfectly secure against node capture and eavesdropping if initial communications after node deployment is secure. If, however, an attacker can eavesdrop on the initial communications, they can take the session key. We use common neighbors for each node to generate the session key. Each node has own secret key and shares it with its neighbor nodes. Then each node can establish the session key using common neighbors' secret keys and a random number. Our scheme needs only a few communications even if it uses neighbor nodes' information. Without losing the lightness of basic scheme, it improves the resistance against eavesdropping on the initial communications more than 30%.

UR - http://www.scopus.com/inward/record.url?scp=78651530537&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=78651530537&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:78651530537

VL - 36

SP - 249

EP - 254

JO - World Academy of Science, Engineering and Technology

JF - World Academy of Science, Engineering and Technology

SN - 2010-376X

ER -