DocumentCode
190108
Title
Key management technique for WSNs
Author
Kodali, Ravi Kishore
Author_Institution
Dept. of Electron. & Commun. Eng., Nat. Inst. of Technol., Warangal, India
fYear
2014
fDate
14-16 April 2014
Firstpage
540
Lastpage
545
Abstract
In Wireless sensor networks (WSNs), many tiny sensor nodes communicate using wireless links and collaborate with each other. The data collected by each of the nodes is communicated towards the gateway node after carrying out aggregation of the data by different nodes. It is necessary to secure the data collected by the WSN nodes while they communicate among themselves using multi hop wireless links. To meet this objective it is required to make use of energy efficient cryptographic algorithms so that the same can be ported over the resource constrained nodes. It is needed to create trust initially among the WSN nodes while using any of the cryptographic algorithms. Towards this, a key management technique needs to be made use of. Due to the resource constrained nature of the WSN nodes and the remote deployment of the nodes, an implementation of conventional key management techniques is infeasible. This work proposes a key management technique, with its reduced resource overheads, which is highly suited to be used in hierarchical WSN applications. Both Identity based key management (IBK) and probabilistic key pre-distribution schemes are made use of at different hierarchical levels. The proposed key management technique has been implemented using IRIS WSN nodes. A comparison of resource overheads has also been carried out.
Keywords
computer network security; cryptography; energy conservation; internetworking; radio links; statistical distributions; telecommunication power management; wireless sensor networks; IRIS WSN nodes; energy efficient cryptographic algorithm; gateway node; hierarchical WSN applications; identity based key management technique; multihop wireless links; probabilistic key predistribution scheme; wireless sensor network; Cryptography; Memory management; Probabilistic logic; Protocols; Wireless communication; Wireless sensor networks; IBK; Key management; WSN; security;
fLanguage
English
Publisher
ieee
Conference_Titel
Region 10 Symposium, 2014 IEEE
Conference_Location
Kuala Lumpur
Print_ISBN
978-1-4799-2028-0
Type
conf
DOI
10.1109/TENCONSpring.2014.6863093
Filename
6863093
Link To Document