Key Predistribution in Wireless Sensor Networks When Sensors Are Within Communication Range

  • Ruj S
  • Nayak A
  • Stojmenovic I
N/ACitations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Wireless networks are more vulnerable to security threats than wirednetworks. Since sensors are resource constrained, the use of traditionalcryptographic key management techniques is not practical. Hence keys aredistributed in sensor nodes prior to their deployment. This method,called key predistribution, was investigated recently in a number ofstudies. This chapter restricts the discussion to single-hop networks,where any two sensors are within communication range of each other. Thegoal is to enable any two sensor nodes to exchange information usingtheir common key, so that other sensors, or an adversary, are unable todecode the message. If two sensor nodes do not share a common key then apath between them, via other sensor nodes, is established, with sensorson the path being able to decode a message and forward it encrypted witha new key. We describe different types of key predistribution schemesfor single-hop networks and discuss their merits and demerits in termsof resiliency (impact of node compromises), scalability, connectivity,and memory, computation, and communication resources. Shared-keydiscovery process should minimize the use of communication bandwidth. Wealso discuss the identification of compromised nodes and revocationtechniques.

Cite

CITATION STYLE

APA

Ruj, S., Nayak, A., & Stojmenovic, I. (2011). Key Predistribution in Wireless Sensor Networks When Sensors Are Within Communication Range (pp. 787–832). https://doi.org/10.1007/978-3-642-14849-1_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free