2009 Fifth International Conference on Mobile Ad-Hoc and Sensor Networks 2009
DOI: 10.1109/msn.2009.26
|View full text |Cite
|
Sign up to set email alerts
|

A Key Management Scheme for Heterogeneous Sensor Networks Using Keyed-Hash Chain

Abstract: We present a suite of key management scheme for heterogeneous sensor networks. In view of different types of communications, a single key can not satisfy various communication requirements. It is necessary to study the establishment and renewal of different types of keys in heterogeneous sensor networks. In this paper, we propose a new key management scheme which can support five types of communications. Our basic scheme is based on a keyed-hash chain approach. A new cluster mechanism is used to improve the pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 12 publications
(39 reference statements)
0
5
0
Order By: Relevance
“…Three scenario-based schemes reduce the memory and computational overhead along with high resilience against node capture attacks. A key management regime described in [ 24 ] used a keyed hash chain. It supports the establishment and renewal of five keys, and it also overcomes the drawback of a single key.…”
Section: Related Workmentioning
confidence: 99%
“…Three scenario-based schemes reduce the memory and computational overhead along with high resilience against node capture attacks. A key management regime described in [ 24 ] used a keyed hash chain. It supports the establishment and renewal of five keys, and it also overcomes the drawback of a single key.…”
Section: Related Workmentioning
confidence: 99%
“…The related work discusses recent key management mechanism based on hash key mechanism. Biming Tian et al [6] describes a key management scheme for heterogeneous sensor networks which uses keyed-hash chain. It uses cluster-based approach to enhance the probability of key sharing between sensors and their cluster heads.…”
Section: Related Workmentioning
confidence: 99%
“…The key management mechanisms are playing major roles to defend such attacks. The literature [6][7][8][9][10] proposes different key management algorithms considering network management and sharing of key among the different nodes. The key management mechanisms available for establishing secure connectivity must minimally incorporate authenticity, confidentiality, integrity, scalability, and flexibility [6][7][8][9][10].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The protocol ensures security of un-compromised nodes until a minimum number of nodes are compromised in the same group. In [16] also, protocols are proposed for group communications among sensors and cluster-heads. The approach uses symmetric keys throughout, and also proposes a protocol for cluster-head selection to maximize chances of key sharing with sensors in the group.…”
Section: A Rkp Based Schemesmentioning
confidence: 99%