A key management scheme for heterogeneous sensor networks using keyed-hash chain
We present a suite of key management scheme for heterogeneous sensor networks. In view of different types of communications, a single key can not satisfy various communication requirements. It is necessary to study the establishment and renewal of different types of keys in heterogeneous sensornetwo...
| Main Authors: | , , |
|---|---|
| Other Authors: | |
| Format: | Conference Paper |
| Published: |
IEEE
2009
|
| Subjects: | |
| Online Access: | http://doi.ieeecomputersociety.org/10.1109/MSN.2009.26 http://hdl.handle.net/20.500.11937/19017 |
| _version_ | 1848749913238667264 |
|---|---|
| author | Tian, Biming Han, Song Dillon, Tharam S. |
| author2 | Xiaohua Jia |
| author_facet | Xiaohua Jia Tian, Biming Han, Song Dillon, Tharam S. |
| author_sort | Tian, Biming |
| building | Curtin Institutional Repository |
| collection | Online Access |
| description | We present a suite of key management scheme for heterogeneous sensor networks. In view of different types of communications, a single key can not satisfy various communication requirements. It is necessary to study the establishment and renewal of different types of keys in heterogeneous sensornetworks. In this paper, we propose a new key management scheme which can support five types of communications. Our basic scheme is based on a keyed-hash chain approach. A new cluster mechanism is used to improve the probability of key sharing between sensors and their cluster heads. Different from existing schemes where a node capture attack might lead to the disclosure of several key chains, our method can avoid this drawback through not storing network-wide generating keys inlow-cost sensors. Only pairwise keys involving the compromised node should be deleted in our scheme. It is motivated by the observation that all the information stored on a sensor may be disclosed once the sensor gets compromised. Through the analysis of both security and performance, we show the scheme meets the security requirements. |
| first_indexed | 2025-11-14T07:28:29Z |
| format | Conference Paper |
| id | curtin-20.500.11937-19017 |
| institution | Curtin University Malaysia |
| institution_category | Local University |
| last_indexed | 2025-11-14T07:28:29Z |
| publishDate | 2009 |
| publisher | IEEE |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | curtin-20.500.11937-190172022-12-09T05:23:42Z A key management scheme for heterogeneous sensor networks using keyed-hash chain Tian, Biming Han, Song Dillon, Tharam S. Xiaohua Jia Jiannong Cao keyed-hash function key predistribution heterogeneous sensor network key management We present a suite of key management scheme for heterogeneous sensor networks. In view of different types of communications, a single key can not satisfy various communication requirements. It is necessary to study the establishment and renewal of different types of keys in heterogeneous sensornetworks. In this paper, we propose a new key management scheme which can support five types of communications. Our basic scheme is based on a keyed-hash chain approach. A new cluster mechanism is used to improve the probability of key sharing between sensors and their cluster heads. Different from existing schemes where a node capture attack might lead to the disclosure of several key chains, our method can avoid this drawback through not storing network-wide generating keys inlow-cost sensors. Only pairwise keys involving the compromised node should be deleted in our scheme. It is motivated by the observation that all the information stored on a sensor may be disclosed once the sensor gets compromised. Through the analysis of both security and performance, we show the scheme meets the security requirements. 2009 Conference Paper http://hdl.handle.net/20.500.11937/19017 http://doi.ieeecomputersociety.org/10.1109/MSN.2009.26 IEEE fulltext |
| spellingShingle | keyed-hash function key predistribution heterogeneous sensor network key management Tian, Biming Han, Song Dillon, Tharam S. A key management scheme for heterogeneous sensor networks using keyed-hash chain |
| title | A key management scheme for heterogeneous sensor networks using keyed-hash chain |
| title_full | A key management scheme for heterogeneous sensor networks using keyed-hash chain |
| title_fullStr | A key management scheme for heterogeneous sensor networks using keyed-hash chain |
| title_full_unstemmed | A key management scheme for heterogeneous sensor networks using keyed-hash chain |
| title_short | A key management scheme for heterogeneous sensor networks using keyed-hash chain |
| title_sort | key management scheme for heterogeneous sensor networks using keyed-hash chain |
| topic | keyed-hash function key predistribution heterogeneous sensor network key management |
| url | http://doi.ieeecomputersociety.org/10.1109/MSN.2009.26 http://hdl.handle.net/20.500.11937/19017 |