Key management in wireless sensor networks

Yann-Hang Lee, Vikram Phadke, Amit Deshmukh, Jin Wook Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Wireless sensor networks hold the promise of facilitating large-scale, real-time data processing in complex environments. As sensor networks edge closer towards widespread deployment, security issues become a central concern. Key management in wireless sensor networks is a challenging problem. Computationally complex asymmetric crypto techniques are unsuitable for use in resource-constrained sensor nodes and use of symmetric cryptography makes the entire network vulnerable in the event of node compromise. This paper presents a key management scheme that satisfies both operational and security requirements of distributed wireless sensor networks. The proposed scheme accommodates other techniques like data aggregation for energy efficiency and watch-dog mechanism for intrusion monitoring. Also, the proposed scheme is generic enough so that it can be applied to variety of sensor network protocols.

Original languageEnglish (US)
Title of host publicationLecture Notes in Computer Science
EditorsC. Castelluccia, H. Hartenstein, C. Paar, D. Westhoff
Pages190-204
Number of pages15
Volume3313
StatePublished - 2005
EventFirst European Workshop, ESAS 2004 - Heidelberg, Germany
Duration: Aug 6 2004Aug 6 2004

Other

OtherFirst European Workshop, ESAS 2004
CountryGermany
CityHeidelberg
Period8/6/048/6/04

Fingerprint

Wireless sensor networks
Sensor networks
Watches
Sensor nodes
Cryptography
Energy efficiency
Agglomeration
Network protocols
Monitoring

ASJC Scopus subject areas

  • Computer Science (miscellaneous)

Cite this

Lee, Y-H., Phadke, V., Deshmukh, A., & Lee, J. W. (2005). Key management in wireless sensor networks. In C. Castelluccia, H. Hartenstein, C. Paar, & D. Westhoff (Eds.), Lecture Notes in Computer Science (Vol. 3313, pp. 190-204)

Key management in wireless sensor networks. / Lee, Yann-Hang; Phadke, Vikram; Deshmukh, Amit; Lee, Jin Wook.

Lecture Notes in Computer Science. ed. / C. Castelluccia; H. Hartenstein; C. Paar; D. Westhoff. Vol. 3313 2005. p. 190-204.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lee, Y-H, Phadke, V, Deshmukh, A & Lee, JW 2005, Key management in wireless sensor networks. in C Castelluccia, H Hartenstein, C Paar & D Westhoff (eds), Lecture Notes in Computer Science. vol. 3313, pp. 190-204, First European Workshop, ESAS 2004, Heidelberg, Germany, 8/6/04.
Lee Y-H, Phadke V, Deshmukh A, Lee JW. Key management in wireless sensor networks. In Castelluccia C, Hartenstein H, Paar C, Westhoff D, editors, Lecture Notes in Computer Science. Vol. 3313. 2005. p. 190-204
Lee, Yann-Hang ; Phadke, Vikram ; Deshmukh, Amit ; Lee, Jin Wook. / Key management in wireless sensor networks. Lecture Notes in Computer Science. editor / C. Castelluccia ; H. Hartenstein ; C. Paar ; D. Westhoff. Vol. 3313 2005. pp. 190-204
@inproceedings{b70260a37b7a4645bbc78e8888553f88,
title = "Key management in wireless sensor networks",
abstract = "Wireless sensor networks hold the promise of facilitating large-scale, real-time data processing in complex environments. As sensor networks edge closer towards widespread deployment, security issues become a central concern. Key management in wireless sensor networks is a challenging problem. Computationally complex asymmetric crypto techniques are unsuitable for use in resource-constrained sensor nodes and use of symmetric cryptography makes the entire network vulnerable in the event of node compromise. This paper presents a key management scheme that satisfies both operational and security requirements of distributed wireless sensor networks. The proposed scheme accommodates other techniques like data aggregation for energy efficiency and watch-dog mechanism for intrusion monitoring. Also, the proposed scheme is generic enough so that it can be applied to variety of sensor network protocols.",
author = "Yann-Hang Lee and Vikram Phadke and Amit Deshmukh and Lee, {Jin Wook}",
year = "2005",
language = "English (US)",
volume = "3313",
pages = "190--204",
editor = "C. Castelluccia and H. Hartenstein and C. Paar and D. Westhoff",
booktitle = "Lecture Notes in Computer Science",

}

TY - GEN

T1 - Key management in wireless sensor networks

AU - Lee, Yann-Hang

AU - Phadke, Vikram

AU - Deshmukh, Amit

AU - Lee, Jin Wook

PY - 2005

Y1 - 2005

N2 - Wireless sensor networks hold the promise of facilitating large-scale, real-time data processing in complex environments. As sensor networks edge closer towards widespread deployment, security issues become a central concern. Key management in wireless sensor networks is a challenging problem. Computationally complex asymmetric crypto techniques are unsuitable for use in resource-constrained sensor nodes and use of symmetric cryptography makes the entire network vulnerable in the event of node compromise. This paper presents a key management scheme that satisfies both operational and security requirements of distributed wireless sensor networks. The proposed scheme accommodates other techniques like data aggregation for energy efficiency and watch-dog mechanism for intrusion monitoring. Also, the proposed scheme is generic enough so that it can be applied to variety of sensor network protocols.

AB - Wireless sensor networks hold the promise of facilitating large-scale, real-time data processing in complex environments. As sensor networks edge closer towards widespread deployment, security issues become a central concern. Key management in wireless sensor networks is a challenging problem. Computationally complex asymmetric crypto techniques are unsuitable for use in resource-constrained sensor nodes and use of symmetric cryptography makes the entire network vulnerable in the event of node compromise. This paper presents a key management scheme that satisfies both operational and security requirements of distributed wireless sensor networks. The proposed scheme accommodates other techniques like data aggregation for energy efficiency and watch-dog mechanism for intrusion monitoring. Also, the proposed scheme is generic enough so that it can be applied to variety of sensor network protocols.

UR - http://www.scopus.com/inward/record.url?scp=23944471754&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=23944471754&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:23944471754

VL - 3313

SP - 190

EP - 204

BT - Lecture Notes in Computer Science

A2 - Castelluccia, C.

A2 - Hartenstein, H.

A2 - Paar, C.

A2 - Westhoff, D.

ER -