Proceedings of the International Conference on Internet of Things and Cloud Computing 2016
DOI: 10.1145/2896387.2900322
|View full text |Cite
|
Sign up to set email alerts
|

A Dynamic and Distributed Key Management Scheme for Wireless Sensor Networks

Abstract: International audienceEnsuring key management in Wireless Sensor Networks has a vital importance, especially when sensor nodes have to communicate in hostile environments. In this paper, we propose a new simple and resource-aware key management scheme. The scheme is based on the idea that the initial pre-distributed key is not pre-loaded in all nodes to improve its resilience to node compromising attacks. Each node has to store an initial key, a set of prime number groups and a pseudo-random function. This pre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…However, the nature of such connected devices limits the use of conventional key establishment techniques. Many researchers have proposed to use symmetric key pre-distribution schemes for the key establishment objective [40,42]. These schemes consider the resource limitation, the communication capability and the computation speed [43].…”
Section: Key Establishment Algorithmmentioning
confidence: 99%
“…However, the nature of such connected devices limits the use of conventional key establishment techniques. Many researchers have proposed to use symmetric key pre-distribution schemes for the key establishment objective [40,42]. These schemes consider the resource limitation, the communication capability and the computation speed [43].…”
Section: Key Establishment Algorithmmentioning
confidence: 99%
“…Three GKA protocols are proposed by Álvarez‐Bermejo et al, 32 all of these protocols are derived from Diffie–Hellman method, group keys are shared among different nodes, and security key distribution is performed. Laouid Abdelkader et al 33 proposed a new resource‐aware key management technology. The initial key is not predistributed in nodes in this scheme, which can improve the node's resistance to attack.…”
Section: Introductionmentioning
confidence: 99%
“…So this protocol is particularly suitable for large and dense Network. In Reference [15], attacks on WSNs protocols generally fall into one of two following categories: routing-disruption attacks and resource consumption attacks. Wormhole attack is classified into routing-disruption attacks.…”
Section: Introductionmentioning
confidence: 99%