A hierarchical key establishment scheme for wireless sensor networks

被引:24
作者
Ibriq, Jamil [1 ]
Mahgoub, Imad [1 ]
机构
[1] Florida Atlantic Univ, Boca Raton, FL 33431 USA
来源
21ST INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING AND APPLICATIONS, PROCEEDINGS | 2007年
关键词
D O I
10.1109/AINA.2007.14
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents Hierarchical Key Establishment Scheme (HIKES) for wireless sensor networks. In this scheme, the base station, acting as the central trust authority, empowers randomly selected sensors to act as local trust authorities authenticating on its behalf the cluster members and issuing all secret keys. HIKES uses a partial key escrow scheme that enables any sensor node selected as a cluster head to generate all the cryptographic keys needed to authenticate other sensors within its cluster. This scheme localizes authentication and key distribution, thereby reducing the communication cost with the base station. HIKES also provides one-step broadcast authentication mechanism and shows robustness against most known routing attacks. Simulation results show that HIKES provides an efficient and scalable solution to the key management problem.
引用
收藏
页码:210 / +
页数:2
相关论文
共 36 条
[21]   Secure routing in wireless sensor networks: Attacks and countermeasures [J].
Karlof, C ;
Wagner, D .
PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL WORKSHOP ON SENSOR NETWORK PROTOCOLS AND APPLICATIONS, 2003, :113-127
[22]  
LAI B, 2002, IEEE WORKSHOP LARTES
[23]  
Lee JY, 2005, LECT NOTES COMPUT SC, V3357, P294
[24]  
LIU D, 2005, ACM T INFORM SYSTEM, V8, P41, DOI DOI 10.1145/1053283
[25]  
LIU D, 2003, P 10 NDSSS SAN DIAG
[26]  
Mahgoub I, 2006, SMART DUST SENSOR NE
[27]   USING ENCRYPTION FOR AUTHENTICATION IN LARGE NETWORKS OF COMPUTERS [J].
NEEDHAM, RM ;
SCHROEDER, MD .
COMMUNICATIONS OF THE ACM, 1978, 21 (12) :993-999
[28]   KERBEROS - AN AUTHENTICATION SERVICE FOR COMPUTER-NETWORKS [J].
NEUMAN, BC ;
TSO, T .
IEEE COMMUNICATIONS MAGAZINE, 1994, 32 (09) :33-38
[29]  
OTWAY D, 1987, ACM OPERATING SYST R, V21, P8, DOI DOI 10.1145/24592.24594
[30]   Security in wireless sensor networks [J].
Perrig, A ;
Stankovic, J ;
Wagner, D .
COMMUNICATIONS OF THE ACM, 2004, 47 (06) :53-57