Security and Privacy in Communication Networks. 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers

Research Article

Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks

Download
485 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-05284-2_16,
        author={Yanjiang Yang and Jianying Zhou and Robert Deng and Feng Bao},
        title={Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks},
        proceedings={Security and Privacy in Communication Networks. 5th International ICST Conference, SecureComm 2009, Athens, Greece, September 14-18, 2009, Revised Selected Papers},
        proceedings_a={SECURECOMM},
        year={2012},
        month={5},
        keywords={Wireless sensor network self-healing group key distribution wireless sensor network security},
        doi={10.1007/978-3-642-05284-2_16}
    }
    
  • Yanjiang Yang
    Jianying Zhou
    Robert Deng
    Feng Bao
    Year: 2012
    Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-642-05284-2_16
Yanjiang Yang1,*, Jianying Zhou1,*, Robert Deng2,*, Feng Bao1,*
  • 1: Institute for Infocomm Research
  • 2: Singapore Management University
*Contact email: yyang@i2r.a-star.edu.sg, jyzhou@i2r.a-star.edu.sg, robertdeng@smu.edu.sg, baofeng@i2r.a-star.edu.sg

Abstract

Self-healing group key distribution aims to achieve robust key distribution over lossy channels in wireless sensor networks (WSNs). However, all existing self-healing group key distribution schemes in the literature consider homogenous WSNs which are known to be unscalable. Heterogeneous WSNs have better scalability and performance than homogenous ones. We are thus motivated to study self-healing group key distribution, tailored to the heterogeneous WSN architecture. In particular, we revisit and adapt Dutta ’s model to the setting of hierarchical self-healing group key distribution, and propose a concrete scheme that achieves computational security and high efficiency.