Key management in wireless sensor networks

3Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Wireless sensor networks hold the promise of facilitating large-scale, real-time data processing in complex environments. As sensor networks edge closer towards widespread deployment, security issues become a central concern. Key management in wireless sensor networks is a challenging problem. Computationally complex asymmetric crypto techniques are unsuitable for use in resource-constrained sensor nodes and use of symmetric cryptography makes the entire network vulnerable in the event of node compromise. This paper presents a key management scheme that satisfies both operational and security requirements of distributed wireless sensor networks. The proposed scheme accommodates other techniques like data aggregation for energy efficiency and watch-dog mechanism for intrusion monitoring. Also, the proposed scheme is generic enough so that it can be applied to variety of sensor network protocols. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Lee, Y. H., Phadke, V., Deshmukh, A., & Lee, J. W. (2005). Key management in wireless sensor networks. In Lecture Notes in Computer Science (Vol. 3313, pp. 190–204). Springer Verlag. https://doi.org/10.1007/978-3-540-30496-8_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free