• DocumentCode
    1839232
  • Title

    Consideration of efficient nearest node discovering mechanisms for key infection

  • Author

    Hwang, Jin-Bum ; Hwang, Young-Sik ; Han, Jong-Wook

  • Author_Institution
    Div. of Inf. Security Res., Electron. & Telecommun. Res. Inst., Daejeon
  • Volume
    3
  • fYear
    2006
  • fDate
    20-22 Feb. 2006
  • Lastpage
    1689
  • Abstract
    Given the growing number of applications of wireless sensor networks, security has been focused on as an important issue. One of the important security issues in sensor networks is key agreement scheme. Several schemes have been proposed, but none of them satisfy the sensor network requirement absolutely due to the serious constrains of the sensor network. Key infection (R. Anderson et al., 2004) intends to solve this problem by introducing a new paradigm in key agreement scheme on sensor networks, which assumes a realistic attacker model. In the key infection model, it is important to discover nearest sensor node at the key agreement time for secrecy improving. In this paper, we suggest several mechanisms to discover nearest sensor node, which is named "key whispering" in the key infection model, and compare them with each other in terms of energy efficiency and secrecy
  • Keywords
    cryptography; telecommunication security; wireless sensor networks; key agreement scheme; key infection; key whispering; nearest node discovering mechanisms; sensor node; wireless sensor networks; Base stations; Broadcasting; Computer network management; Computer networks; Monitoring; Protocols; Public key; Space technology; Wireless sensor networks; Key Infection; Key Whispering; Sensor Network;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Advanced Communication Technology, 2006. ICACT 2006. The 8th International Conference
  • Conference_Location
    Phoenix Park
  • Print_ISBN
    89-5519-129-4
  • Type

    conf

  • DOI
    10.1109/ICACT.2006.206312
  • Filename
    1625917