A self-managing volatile key scheme for wireless sensor networks
[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
0202 electrical engineering, electronic engineering, information engineering
02 engineering and technology
DOI:
10.1007/s12652-018-0772-9
Publication Date:
2018-03-25T21:23:46Z
AUTHORS (7)
ABSTRACT
The last decade has seen major advances in Wireless Sensor Networks (WSN). The limited amount of resources in WSNs is the main challenge for securing them. Indeed, sensors are inherently small devices with limited embedded storage, processor and battery capacity. The situation is even worse when attackers, with virtually unlimited amount of resources, have direct physical access to sensors. Cryptographic keys are used for authentication, authorization, confidentiality, data integrity, as well as many other security services. Several proposals have been made for key management in WSNs. In this paper, we review some notable key management schemes and propose a new one. The originality of our work lies in two main facts: first, we do not place a master key on all sensors before deploying them as several other proposals did, but we rather place the master key in a subset of sensors; second, the master keys are volatile, i.e., sensors use the master key to bootstrap the system and they delete them shortly after that. Our extensive simulations have shown the efficiency of our approach.
SUPPLEMENTAL MATERIAL
Coming soon ....
REFERENCES (42)
CITATIONS (10)
EXTERNAL LINKS
PlumX Metrics
RECOMMENDATIONS
FAIR ASSESSMENT
Coming soon ....
JUPYTER LAB
Coming soon ....