An efficient key management scheme for heterogeneous sensor networks

Xiaojiang Du, Sghaier Guizani, Yang Xiao, Hsiao Hwa Chen

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Security is critical for sensor networks deployed in hostile environments. Previous research on sensor network security mainly considers homogeneous sensor networks, i.e., all sensor nodes have the same capabilities. Many security schemes designed for homogeneous sensor networks suffer from high communication/computation overhead, and/or large storage requirement. We adopt a Heterogeneous Sensor Network (HSN) model to overcome these problems. In this paper, we present an efficient Asymmetric Pre-distribution (AP) key management scheme that takes advantage of the powerful high-end sensors (H-sensors) in an HSN. The AP scheme utilizes the large storage of H-sensors and pre-load each H-sensor with a relatively large number of keys. The AP scheme dramatically reduces the total storage space for key pre-distribution. The performance evaluation and security analysis show that the AP scheme provides better security than existing key management schemes, while achieving significant reduction on sensor storage.

Original languageEnglish
Title of host publicationIEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference
DOIs
StatePublished - 2006
EventIEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference - San Francisco, CA, United States
Duration: 27 Nov 20061 Dec 2006

Publication series

NameGLOBECOM - IEEE Global Telecommunications Conference

Conference

ConferenceIEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference
Country/TerritoryUnited States
CitySan Francisco, CA
Period27/11/061/12/06

Keywords

  • Heterogeneous sensor networks
  • Key management
  • Key pre-distribution
  • Security

Fingerprint

Dive into the research topics of 'An efficient key management scheme for heterogeneous sensor networks'. Together they form a unique fingerprint.

Cite this