A light-weight protocol for data integrity and authentication in wireless sensor networks

1Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In a wireless sensor network, pre-distribution of secret keys is possibly the most practical approach to protect network communications. To meet the stringent resource constraints of the sensor nodes, such as limited storage capability, low computation capability, and limited battery life, key pre-distribution schemes should be highly efficient, namely requiring as little storage space as possible, and at the same time, maintain a strong security strength, i.e., high resilience against node capture. In this paper, a new approach for random key pre-distribution is proposed to achieve both efficiency and security goals. The novelty of this approach lies in that, instead of using a key pool consisting of random keys, a random key generation technique is carefully designed such that a large number of random keys can be represented by a small number of key generation keys. Then, instead of storing a big number of random keys, each sensor node stores a small number of key-generation keys while computes the shared secret key during the bootstrapping phase on-the-fly using efficient hash operations. © Springer-Verlag Berlin Heidelberg 2011.

Cite

CITATION STYLE

APA

Abraham, J., Nagasimha, M. P., Bhatt, M., & Naik, C. (2011). A light-weight protocol for data integrity and authentication in wireless sensor networks. In Communications in Computer and Information Science (Vol. 132 CCIS, pp. 383–390). https://doi.org/10.1007/978-3-642-17878-8_39

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free