DocumentCode :
3266101
Title :
A Hybrid Key Management Protocol for Wireless Sensor Networks
Author :
Rahman, Musfiq ; Sampalli, Srinivas
Author_Institution :
Fac. of Comput. Sci., Dalhousie Univ., Halifax, NS, Canada
fYear :
2012
fDate :
25-27 June 2012
Firstpage :
769
Lastpage :
776
Abstract :
Wireless Sensor Networks (WSNs) are wireless ad-hoc networks of tiny battery-operated wireless sensors. They are usually deployed in unsecured, open, and, harsh environments where it is difficult for humans to perform continuous monitoring. Due to its nature of deployment it is very crucial to provide security mechanisms for authenticating data. Key management is a pre-requisite for any security mechanism. Due to memory, computation, and communication constraints of sensor nodes, distribution and management of key in WSNs is a challenging task. Because of its lightweight feature, symmetric crypto-systems are a natural choice for key management in WSNs. However, they often fail to provide a good trade-off between resilience and storage. On the other hand, Public Key Infrastructure (PKI) is infeasible in WSNs because of its continuous availability of trusted third party and heavy computational requirements for certificate verification. Pairing-Based Cryptography (PBC) has paved a way for how parties can agree on keys without any interaction. It has relaxed the requirement of expensive certificate verification on PKI system. In this paper, we propose a new hybrid ID based non-interactive key management protocol for WSNs, which leverages the benefits from both symmetric key based cryptosystems and PBC by combining them together. The proposed protocol is very flexible and suits many applications. We also provide mechanisms for key refresh when the network changes.
Keywords :
ad hoc networks; cryptographic protocols; message authentication; public key cryptography; wireless sensor networks; PBC; PKI system; WSN; battery-operated wireless sensors; certificate verification; communication constraints; computation constraints; data authentication; hybrid ID based noninteractive key management protocol; identity based cryptography; identity based encryption; memory constraints; pairing-based cryptography; public key infrastructure; security mechanisms; sensor nodes; symmetric cryptosystems; trusted third party; wireless ad-hoc networks; wireless sensor networks; Polynomials; Protocols; Public key; Resilience; Wireless sensor networks; Identity Based Cryptography; Identity Based Encryption; Key management protocol; Pairing; Symmetric crypto-system; Wireless Sensor Network;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
Conference_Location :
Liverpool
Print_ISBN :
978-1-4673-2172-3
Type :
conf
DOI :
10.1109/TrustCom.2012.32
Filename :
6296047
Link To Document :
بازگشت