Share This Article:

A Hybrid Key Management Scheme Based on Clustered Wireless Sensor Networks

Abstract Full-Text HTML Download Download as PDF (Size:276KB) PP. 197-201
DOI: 10.4236/wsn.2012.48029    3,722 Downloads   6,291 Views   Citations

ABSTRACT

According to the weakness of session key construction based on node’s own location, we propose a hybrid key management scheme which based on clustered wireless sensor networks. The use of hierarchical thinking, reducing the amount of key storage and computing, while supporting network topology, dynamic key management for which aims to prevent leakage. Through analyzing, it shows that the scheme have certain advantages in key connectivity, security, communication and energy consumption.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

P. Zhao, Y. Xu and M. Nan, "A Hybrid Key Management Scheme Based on Clustered Wireless Sensor Networks," Wireless Sensor Network, Vol. 4 No. 8, 2012, pp. 197-201. doi: 10.4236/wsn.2012.48029.

References

[1] H.-X. Jing and X.-D. Hu, “A Location Based Key Management Scheme for Wireless Networks,” Communication Technology, Vol. 11, No. 40, 2007, pp. 311-313.
[2] L. M. Yu, J. Z. Li, Y. Chen, et al., “Wireless Sensor Networks,” Tsinghua University Press, Beijing, 2005.
[3] X. W. Zhou and B. P. Qin, “Scalable Session Key Construction Protocol for Wireless Sensor Networks. Wireless Sensor Networks and Security,” National Defense Industry Press, Beijing, 2007.
[4] L. Eschenauer and V. D. Gligor, “A Key Management Scheme for Distributed Sensor Networks,” The 9th ACM CCS, Washington DC, 2002, pp. 41-47.
[5] S. Zhu, S. Setia and S. Jajodia, “LEAP: Efficient Security Mechanism for Large-Scale Distributed Sensor Networks,” Procceedings of the 10th ACM Conference on Computer and Communications Security, New York, 14 June 2004, pp. 62-72.
[6] M. Eltoweissy, M. Moharrum and R. Mukkamala, “Dynamic Key Management in Sensor Networks,” IEEE Communications Magazine, Vol. 44, No. 4, 2006, pp. 122-130. doi:10.1109/MCOM.2006.1632659
[7] H. Chan, A. Perrig and D. Song, “Random Key Predistribution Schemes for Sensor Networks,” Procceedings of the 2003 IEEE Symposium on Security and Privacy, IEEE Computer Society, Washington, 2003, pp. 197-213.
[8] H.-X. Jing and X.-D. Hu, “A Location Based Key Management Scheme for Wireless Networks,” Communication Technology, Vol. 11, No. 40, 2007, pp. 311-313.
[9] B. Shen, S. Y. Zhang and Y. P. Zhong, “Hierarchical Routing Protocol for Wireless Sensor Networks,” Journal of Software, Vol. 17, No. 7, 2006, pp. 1588-1600. doi:10.1360/jos171588
[10] E.-O. Blaβ and M. Zitterbart, “An Efficient Key Establishment Scheme for Secure Aggregating Sensor Networks,” Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, Taipei, 2006, pp. 303-310.

  
comments powered by Disqus

Copyright © 2019 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.