DocumentCode
1839232
Title
Consideration of efficient nearest node discovering mechanisms for key infection
Author
Hwang, Jin-Bum ; Hwang, Young-Sik ; Han, Jong-Wook
Author_Institution
Div. of Inf. Security Res., Electron. & Telecommun. Res. Inst., Daejeon
Volume
3
fYear
2006
fDate
20-22 Feb. 2006
Lastpage
1689
Abstract
Given the growing number of applications of wireless sensor networks, security has been focused on as an important issue. One of the important security issues in sensor networks is key agreement scheme. Several schemes have been proposed, but none of them satisfy the sensor network requirement absolutely due to the serious constrains of the sensor network. Key infection (R. Anderson et al., 2004) intends to solve this problem by introducing a new paradigm in key agreement scheme on sensor networks, which assumes a realistic attacker model. In the key infection model, it is important to discover nearest sensor node at the key agreement time for secrecy improving. In this paper, we suggest several mechanisms to discover nearest sensor node, which is named "key whispering" in the key infection model, and compare them with each other in terms of energy efficiency and secrecy
Keywords
cryptography; telecommunication security; wireless sensor networks; key agreement scheme; key infection; key whispering; nearest node discovering mechanisms; sensor node; wireless sensor networks; Base stations; Broadcasting; Computer network management; Computer networks; Monitoring; Protocols; Public key; Space technology; Wireless sensor networks; Key Infection; Key Whispering; Sensor Network;
fLanguage
English
Publisher
ieee
Conference_Titel
Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference
Conference_Location
Phoenix Park
Print_ISBN
89-5519-129-4
Type
conf
DOI
10.1109/ICACT.2006.206312
Filename
1625917
Link To Document