We introduce the concept of secure overlays over static key distribution schemes to enable the use of mobile base stations for secure data querying in wireless sensor networks. Secure overlays are key distributions initialized from fixed initialization points, allowing queries to be inserted anywhere in the network. We thereby overcome the need for re-keying when a base station moves, at the cost that a query only spreads in a limited part of the network along the key distribution. On the example of a layered key distribution and a query dissemination protocol we argue that the use of only a few secure overlays can compensate for that artifact. Queries sent from within the area defined by the initialization points reach a significant part of the sensor nodes within the first few hops. © 2010 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Rodhe, I., & Rohner, C. (2010). Secure overlays: Making static key distribution schemes work with mobile base stations in WSNs. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6074 LNCS, pp. 386–397). https://doi.org/10.1007/978-3-642-13315-2_32
Mendeley helps you to discover research relevant for your work.