Abstract
The paper designs a key management scheme for wireless sensor network that can resist key attack against the network. The scheme gives full play to the cluster head’s resources such that the head can carry most of the computation, storage and communication overhead by the cluster head, and thereby achieves the minimum energy consumption of the cluster members and anti capture target, and key attack can resist wireless sensor network effectively. Through the simulation of the key management program in the authorization certificate issuance mechanism, and the development of the corresponding changes in the value of the parameters to assess the performance of each mechanism, it comes to the overall performance of the mechanism ultimately and how the value should be set to get the best performance. Simulation results show that compared with the traditional scheme, the proposed model can effectively improve the node’s anti capture ability and reduce the node energy consumption.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Huanyi, C., Qingsong, C.: Ad hoc technology and WMANET network architecture. Commun. World 1, 44–45 (2003)
Brunno, R., Conti, M., Gregori, E.: Mesh networks: commodity multi-hop ad hoc networks. IEEE Commun. Mag. 43(3), 123–131 (2005)
Whitehead, P.: Mesh networks: a new architecture for broadband wireless access systems. In: Radio and Wireless Conference, Denvor, CO, USA, pp. 43–46. IEEE Press, Piscataway (2000)
Li, C.: Study and research on wireless network authentication technology security based on 802.1x protocol. Comput. Secur. (10), 4–12 (2006)
Fowler, T.: Mesh networks for broadband access. IEE Rev. 47(1), 17–22 (2001)
Rayner, K.: Mesh wireless networking. Commun. Eng. 1(5), 44–47 (2003)
Tabata, K., Kishi, Y., Konishi, S., Nomoto, S.: A study on the autonomous network synchronization scheme for mesh wireless network. In: 14th IEEE 2003 International Symposium on Personal, Indoor and Mobile Radio Communications Proceedings, Beijing, China, pp. 829–833. IEEE, Piscataway (2003)
Kishi, Y., Konishi, S., Nanba, S., Nomoto, S.: A proposal of millimeter-wave multi-hop mesh wireless network architecture with adaptive network control features for broadband fixed wireless access. In: Proceedings RAWCON 2001, IEEE Radio and Wireless Conference, Waltham, MA, USA, pp. 17–20. IEEE, Piscataway (2001)
Akyidiz, I.F., Wang, X., Wang, W.: Wireless mesh networks: a survey. Comput. Netw. 47(4), 445–487 (2005)
Prasad, N.R., Alam, M., Ruggieri, M.: Light-weight AAA infrastructure for mobility support across heterogeneous networks. Wirel. Pers. Commun. 29(3–4), 205–219 (2004)
Houyou, A.M., De Meer, H., Esterhazy, M.: P2P-based mobility management for heterogeneous wireless networks and mesh networks. In: Cesana, M., Fratta, L. (eds.) EuroNGI 2005. LNCS, vol. 3883, pp. 226–241. Springer, Heidelberg (2006). https://doi.org/10.1007/11750673_18
Luo, H., Lu, S.: Ubiquitous and robust authentication, services for ad hoc wireless networks. Technical report 200030. UCLA Computer Science Department (2000)
Mizrak, A.T., Chen, Y.C., Marzullo, K., et al.: Detecting and isolating malicious routers. IEEE Trans. Dependable Secure Comput. 3(3), 230–244 (2006)
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: First IEEE International Workshop on Sensor Network Protocols and Applications, Anchorage, AK 2003, pp. 113–127 (2003)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Wang, Y., Zhao, J. (2018). Key Management Scheme for Wireless Sensor Networks. In: Li, C., Mao, S. (eds) Wireless Internet. WiCON 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 230. Springer, Cham. https://doi.org/10.1007/978-3-319-90802-1_24
Download citation
DOI: https://doi.org/10.1007/978-3-319-90802-1_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-90801-4
Online ISBN: 978-3-319-90802-1
eBook Packages: Computer ScienceComputer Science (R0)