• DocumentCode
    190108
  • Title

    Key management technique for WSNs

  • Author

    Kodali, Ravi Kishore

  • Author_Institution
    Dept. of Electron. & Commun. Eng., Nat. Inst. of Technol., Warangal, India
  • fYear
    2014
  • fDate
    14-16 April 2014
  • Firstpage
    540
  • Lastpage
    545
  • Abstract
    In Wireless sensor networks (WSNs), many tiny sensor nodes communicate using wireless links and collaborate with each other. The data collected by each of the nodes is communicated towards the gateway node after carrying out aggregation of the data by different nodes. It is necessary to secure the data collected by the WSN nodes while they communicate among themselves using multi hop wireless links. To meet this objective it is required to make use of energy efficient cryptographic algorithms so that the same can be ported over the resource constrained nodes. It is needed to create trust initially among the WSN nodes while using any of the cryptographic algorithms. Towards this, a key management technique needs to be made use of. Due to the resource constrained nature of the WSN nodes and the remote deployment of the nodes, an implementation of conventional key management techniques is infeasible. This work proposes a key management technique, with its reduced resource overheads, which is highly suited to be used in hierarchical WSN applications. Both Identity based key management (IBK) and probabilistic key pre-distribution schemes are made use of at different hierarchical levels. The proposed key management technique has been implemented using IRIS WSN nodes. A comparison of resource overheads has also been carried out.
  • Keywords
    computer network security; cryptography; energy conservation; internetworking; radio links; statistical distributions; telecommunication power management; wireless sensor networks; IRIS WSN nodes; energy efficient cryptographic algorithm; gateway node; hierarchical WSN applications; identity based key management technique; multihop wireless links; probabilistic key predistribution scheme; wireless sensor network; Cryptography; Memory management; Probabilistic logic; Protocols; Wireless communication; Wireless sensor networks; IBK; Key management; WSN; security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Region 10 Symposium, 2014 IEEE
  • Conference_Location
    Kuala Lumpur
  • Print_ISBN
    978-1-4799-2028-0
  • Type

    conf

  • DOI
    10.1109/TENCONSpring.2014.6863093
  • Filename
    6863093