Abstract
Symmetric key cryptography (SKC) based solutions for key management in wireless sensor networks have security shortcomings. A more secure solution demands the use of public key cryptography (PKC) based key management scheme. This, however, introduces an increased computation overhead in the tiny devices. An intermediate approach between SKC and PKC may prove beneficial in terms of both security and efficiency. To investigate the applicability of such a hybrid key management approach, a hierarchical organization of sensor network is considered and the security and efficiency characteristics of a pure PKC based key management scheme are compared and evaluated against a semi-PKC based key management scheme. Both theoretical and experimental basis have been considered in this regard.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Wander, A.S., Gura, N., Eberle, H., Gupta, V., Shantz, S.C.: Energy analysis of public-key cryptography for wireless sensor networks. In: Third IEEE International Conference on Pervasive Computing and Communications, pp.324–328 (2005)
Malan, D.J., Welsh, M., Smith, M.D.: A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography. In: IEEE SECON (2004)
Landstra, T., Zawodniok, M., Jagannathan, S.: Energy-Efficient Hybrid Key Management Protocol for Wireless Sensor Networks. In: 32nd IEEE Conference on Local Computer Networks, pp. 1009–1016 (2007)
Cao, X., Huang, M., Chen, Y., Chen, G.: Hybrid Authentication and Key Management Scheme for WSANs. In: Chen, G., Pan, Y., Guo, M., Lu, J. (eds.) ISPA-WS 2005. LNCS, vol. 3759, pp. 454–465. Springer, Heidelberg (2005)
Eltoweissy, M., Moharrum, M., Mukkamala, R.: Dynamic key management in sensor networks. IEEE Communications Magazine 44(4), 122–130 (2006)
Perrig, A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Communications of the ACM, Special Issue on Wireless Sensor Networks 47(6), 53–57 (2004)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and communications security, pp. 41–47 (2002)
Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: IEEE INFOCOM, pp. 586–597 (2004)
Law, Y., Corin, R., Etalle, S., Hartel, P.: A formally verified decentralized key management for wireless sensor networks. Personal Wireless Communications (2003)
Perrig, A., Szewczyk, R., Wen, V., Culler, D.: Spins: Security protocols for sensor networks. Wireless Networks (2002)
Zhu, S., Xu, S., Setia, S., Jajodia, S.: Leap: Efficient security mechanisms for large-scale distributed sensor networks. In: 10th ACM Conference on Computer and Communications Security CCS (2003)
Eltoweissy, M., et al.: Combinatorial Optimization of Key Management in Group Communications. J. Network and Sys. Mgmt., Special Issue on Network Security, 332b (2004)
Younis, M., Ghumman, K., Eltoweissy, M.: Locationaware Combinatorial Key Management Scheme for Clustered Sensor Networks. IEEE Transactions on Parallel and Distributed Systems (2006)
Steiner, M., Tsudik, G., Waidner, M.: Key agreement in dynamic peer groups. IEEE Transactions on Parallel and Distributed Systems (2000)
Burmester, M., Desmedt, Y.G.: A secure and efficient conference key distribution system. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)
Carman, D., Matt, B., Cirincione, G.: Energy-efficient and low-latency key management for sensor networks. In: 23rd Army Science Conference (2002)
Riaz, R., Akbar, A.H., Hasan, M., Kim, K., Lhee, K., Naureen, A., Akram, A., Ahmed, H.F.: Key Management Scheme for Sensor Networks with Proactive Key Revocation and Sleep State Consideration. In: Li, K., Jesshope, C., Jin, H., Gaudiot, J.-L. (eds.) NPC 2007. LNCS, vol. 4672, pp. 368–373. Springer, Heidelberg (2007)
Crossbow Technology inc., http://www.xbow.com
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Naureen, A., Akram, A., Riaz, R., Kim, KH., Ahmed, H.F. (2009). A Comparative Analysis of PKC and Semi-PKC Based Key Management Schemes for Hierarchical Sensor Networks. In: Park, J.H., Chen, HH., Atiquzzaman, M., Lee, C., Kim, Th., Yeo, SS. (eds) Advances in Information Security and Assurance. ISA 2009. Lecture Notes in Computer Science, vol 5576. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02617-1_70
Download citation
DOI: https://doi.org/10.1007/978-3-642-02617-1_70
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02616-4
Online ISBN: 978-3-642-02617-1
eBook Packages: Computer ScienceComputer Science (R0)