Quality, Reliability, Security and Robustness in Heterogeneous Networks. 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers

Research Article

Hybrid Key Management Technique for WSN’s

Download
296 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-37949-9_74,
        author={Ravi Kodali and Sushant Chougule},
        title={Hybrid Key Management Technique for WSN’s},
        proceedings={Quality, Reliability, Security and Robustness in Heterogeneous Networks. 9th International Conference, QShine 2013, Greader Noida, India, January 11-12, 2013, Revised Selected Papers},
        proceedings_a={QSHINE},
        year={2013},
        month={7},
        keywords={WSN Elliptic curves symmetric key pre-distribution IBC},
        doi={10.1007/978-3-642-37949-9_74}
    }
    
  • Ravi Kodali
    Sushant Chougule
    Year: 2013
    Hybrid Key Management Technique for WSN’s
    QSHINE
    Springer
    DOI: 10.1007/978-3-642-37949-9_74
Ravi Kodali1, Sushant Chougule1
  • 1: National Institute of Technology, Warangal

Abstract

Wireless sensor networks are envisaged in military, commercial and healthcare applications, where data security is an important aspect. Security of the data in the network is based on the cryptographic technique and the way in which encryption and decryption keys are established among the nodes. Managing the keys in the network includes node authentication, key agreement and key update phases which poses an additional overhead on network resources. Both Symmetric and Asymmetric key techniques when applied separately in WSN fails to provide a scheme suitable for wide range of applications. Hybrid key management scheme is scalable alternative to match security requirements of WSN with minimum overhead on available resources. Heterogeneous WSN is considered in which ID based key establishment and polynomial based key pre-distribution scheme are proposed for higher and lower level of hierarchy respectively. The results of the proposed hybrid key management scheme indicate reduced resource overhead and improved security level.