Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2006.13C.5.541

Key Update Protocols in Hierarchical Sensor Networks  

Lee, Joo-Young (이화여자대학교 컴퓨터학과)
Park, So-Young (이화여자대학교 컴퓨터학과)
Lee, Sang-Ho (이화여자대학교 컴퓨터학과)
Abstract
Sensor network is a network for realizing the ubiquitous computing circumstances, which aggregates data by means of observation or detection deployed at the inaccessible places with the capacities of sensing and communication. To realize this circumstance, data which sensor nodes gathered from sensor networks are delivered to users, in which it is required to encrypt the data for the guarantee of secure communications. Therefore, it is needed to design key management scheme for encoding appropriate to the sensor nodes which feature continual data transfer, limited capacity of computation and storage and battery usage. We propose a key management scheme which is appropriate to sensor networks organizing hierarchical architecture. Because sensor nodes send data to their parent node, we can reduce routing energy. We assume that sensor nodes have different security levels by their levels in hierarchy. Our key management scheme provides different key establishment protocols according to the security levels of the sensor nodes. We reduce the number of sensor nodes which share the same key for encryption so that we reduce the damage by key exposure. Also, we propose key update protocols which take different terms for each level to update established keys efficiently for secure data encoding.
Keywords
Sensor Network; Security; Hierarchical; Key Update;
Citations & Related Records
연도 인용수 순위
  • Reference
1 G. Jolly, M. C. Kuscu, P. Kokate and M. Younis, 'A Low-Energy Key Management Protocol for Wireless Sensor Networks,' Proc. of the 8th IEEE International Symposium on Computers and Communication, 2003   DOI
2 S. Slijepcevic, M. Potkonjak, V. Tsiatsis, S. Zimbeck and M. B. Srivastava, 'On Communication Security in Wireless Ad-Hoc Sensor Network,' Proc. of WETICE, pp.139-144, 2002
3 D. Liu and P. Ning, 'Establishing Pairwise Keys in Distributed Sensor Networks,' Proc. of the 10th ACM Conference on CCS, pp.52-61, 2003   DOI
4 H. Chan, A. Perrig and D. Song, 'Random Key Predistribution Schemes for Sensor Networks,' Proc. of IEEE Symposium on Security and Privacy, pp.197-213, 2003
5 S. Zhu, S. Setia and S. Jajodia, 'LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks,' Proc. of the 10th ACM Conference on CCS, pp.210-217, 2003   DOI
6 J. D. Richard and S. Mishra, 'Security Support for In-Network Processing in Wireless Sensor Network,' Proc. of ACM Workshop on SASN, pp.83-93, 2003   DOI
7 D. Braginsky and D. Estrin, 'Rumor Routing Algorithm For Sensor Networks,' Proc. of the First ACM International Workshop in Wireless Sensor Networks and Applications, pp.22-31, 2002   DOI
8 L. Eschenauer and V. D. Gligor, 'A Key-Management Scheme for Distributed Sensor Networks,' Proc. of the 9th ACM Conference on CCS, pp.41-47, 2002   DOI
9 M. Tubaishat, J. Yin, B. Panja and S. Madria, 'A Secure Hierarchical Model for Sensor Network,' Proc. of ACM SIGMOD Record, Vol.33, No.1, pp.7-13, 2004   DOI   ScienceOn
10 S. Doshi and A. Eswaran, 'A Hierarchical Security Architecture for Group Communication in Sensor Network,' Project Report, 2003
11 M. Bohge and W. Trappe, 'An Authentication Framework for Hierarchical Ad-Hoc Sensor Networks,' Proc. of ACM Workshop on Wireless Security, pp.79-87, 2003   DOI