Skip to main content

A Key Establishment Scheme for Large-Scale Mobile Wireless Sensor Networks

  • Conference paper
Distributed Computing and Internet Technology (ICDCIT 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4882))

Abstract

In this paper, we propose a key establishment scheme suitable for mobile sensor networks for establishing keys between sensor nodes in an environment where the sensor nodes are highly mobile. Our analysis and simulation results show that our scheme has high network connectivity as well as higher security against sensor node captures compared to those for the existing schemes. Moreover, our scheme supports efficiently addition of new nodes after initial deployment and also works for any deployment topology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Eschenauer, L., Gligor, V.D.: A key management scheme for distributed sensor networks. In: 9th ACM Conference on Computer and Communication Security, pp. 41–47 (2002)

    Google Scholar 

  2. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, Berkeley, California, pp. 197–213 (2003)

    Google Scholar 

  3. Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of 10th ACM Conference on Computer and Communications Security (CCS) (2003)

    Google Scholar 

  4. Dong, Q., Liu, D.: Using Auxiliary Sensors for Pairwise Key Establishment in WSN. In: Networking 2007. Proceedings of 2007 IFIP International Conferences on Networking (2007)

    Google Scholar 

  5. Crossbow Technology Inc.: Wireless sensor networks, http://www.xbow.com

  6. Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. Journal of the ACM 33, 792–807 (1986)

    Article  MathSciNet  Google Scholar 

  7. Blundo, C., Santis, A.D., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Tomasz Janowski Hrushikesha Mohanty

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Das, A.K., Sengupta, I. (2007). A Key Establishment Scheme for Large-Scale Mobile Wireless Sensor Networks. In: Janowski, T., Mohanty, H. (eds) Distributed Computing and Internet Technology. ICDCIT 2007. Lecture Notes in Computer Science, vol 4882. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77115-9_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77115-9_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77112-8

  • Online ISBN: 978-3-540-77115-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics