a novel key management scheme for heterogeneous sensor networks based on the position of nodes
نویسندگان
چکیده
wireless sensor networks (wsns) have many applications in the areas of commercial, military and environmental requirements. regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. a basic approach for preparing a secure wireless communication in wsns, is to propose an efficient cryptographic key management protocol between sensor nodes to achieve maximum security with minimum cost. the main motivation of this paper is to apply the position of the sensor nodes as part of their identity for key management in heterogeneous sensor networks. in the proposed scheme, the position of sensor nodes is considered as a part of their identity and it is used for authentication and dedicating key to all network links. comparing the proposed technique with other schemes shows that it has a higher level of scalability, security, and reliability with less memory complexity.
منابع مشابه
A novel key management scheme for heterogeneous sensor networks based on the position of nodes
Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...
متن کاملHypercube Bivariate-Based Key Management for Wireless Sensor Networks
Wireless sensor networks are composed of very small devices, called sensor nodes,for numerous applications in the environment. In adversarial environments, the securitybecomes a crucial issue in wireless sensor networks (WSNs). There are various securityservices in WSNs such as key management, authentication, and pairwise keyestablishment. Due to some limitations on sensor nodes, the previous k...
متن کاملA Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks
Key encryption technology is a basic technique for protecting the secrecy of transmitted data among sensor nodes in wireless sensor networks. However, sensor nodes are inherently limited by insufficient hardware resources such as memory capacity and battery lifetime. As a result, few current key management schemes are appropriate for wireless sensor networks. This paper proposes a new key manag...
متن کاملAn Authentication and Key Management Scheme for Heterogeneous Sensor Networks
Recently, wireless sensor networks have attracted the attention of research comunity due to its numerous applications especially in mobility scenarios. however it also increases the security threats against confidentiality, integrity and privacy of the information as well as against their connectivity. Hence a proper key management scheme needs to be proposed to secure both information and conn...
متن کاملAn effective key management scheme for heterogeneous sensor networks
Security is critical for sensor networks used in military, homeland security and other hostile environments. Previous research on sensor network security mainly considers homogeneous sensor networks. Research has shown that homogeneous ad hoc networks have poor performance and scalability. Furthermore, many security schemes designed for homogeneous sensor networks suffer from high communication...
متن کاملA Loop-Based Key Management Scheme for Wireless Sensor Networks
Wireless sensor networks are emerging as a promising solution for various types of futuristic applications for both military and the public. The design of key management schemes is one of the most important aspects and basic research field of secure wireless sensor networks. Efficient key management could guarantee authenticity and confidentiality of the data exchanged among the nodes in the ne...
متن کاملمنابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
isecure, the isc international journal of information securityجلد ۸، شماره ۲، صفحات ۱۱۱-۱۲۶
میزبانی شده توسط پلتفرم ابری doprax.com
copyright © 2015-2023