Abstract
The last decade has seen major advances in Wireless Sensor Networks (WSN). The limited amount of resources in WSNs is the main challenge for securing them. Indeed, sensors are inherently small devices with limited embedded storage, processor and battery capacity. The situation is even worse when attackers, with virtually unlimited amount of resources, have direct physical access to sensors. Cryptographic keys are used for authentication, authorization, confidentiality, data integrity, as well as many other security services. Several proposals have been made for key management in WSNs. In this paper, we review some notable key management schemes and propose a new one. The originality of our work lies in two main facts: first, we do not place a master key on all sensors before deploying them as several other proposals did, but we rather place the master key in a subset of sensors; second, the master keys are volatile, i.e., sensors use the master key to bootstrap the system and they delete them shortly after that. Our extensive simulations have shown the efficiency of our approach.
| Original language | English |
|---|---|
| Pages (from-to) | 3349-3364 |
| Number of pages | 16 |
| Journal | Journal of Ambient Intelligence and Humanized Computing |
| Volume | 10 |
| Issue number | 9 |
| DOIs | |
| State | Published - 1 Sep 2019 |
| Externally published | Yes |
Bibliographical note
Publisher Copyright:© 2018, Springer-Verlag GmbH Germany, part of Springer Nature.
Keywords
- Distributed algorithms
- Key management
- Network scalability
- Secure connectivity coverage
- Wireless sensor networks
ASJC Scopus subject areas
- General Computer Science
Fingerprint
Dive into the research topics of 'A self-managing volatile key scheme for wireless sensor networks'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver