About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Mobile and Ubiquitous Systems: Computing, Networking, and Services. 7th International ICST Conference, MobiQuitous 2010, Sydeny, Australia, December 6-9, 2010, Revised Selected Papers

Research Article

A Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks

Download(Requires a free EAI acccount)
614 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-642-29154-8_16,
        author={Junqi Zhang and Rajan Shankaran and Mehmet Orgun and Abdul Sattar and Vijay Varadharajan},
        title={A Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks},
        proceedings={Mobile and Ubiquitous Systems: Computing, Networking, and Services. 7th International ICST Conference, MobiQuitous 2010, Sydeny, Australia, December 6-9, 2010, Revised Selected Papers},
        proceedings_a={MOBIQUITOUS},
        year={2012},
        month={10},
        keywords={Authentication Wireless Sensor Networks},
        doi={10.1007/978-3-642-29154-8_16}
    }
    
  • Junqi Zhang
    Rajan Shankaran
    Mehmet Orgun
    Abdul Sattar
    Vijay Varadharajan
    Year: 2012
    A Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks
    MOBIQUITOUS
    Springer
    DOI: 10.1007/978-3-642-29154-8_16
Junqi Zhang,*, Rajan Shankaran1,*, Mehmet Orgun1,*, Abdul Sattar2,*, Vijay Varadharajan1,*
  • 1: Macquarie University
  • 2: Griffith University
*Contact email: janson@science.mq.edu.au, rshankar@science.mq.edu.au, mehmet@science.mq.edu.au, A.Sattar@griffith.edu.au, vijay@science.mq.edu.au

Abstract

Sensor networks offer economically viable solutions for a wide variety of monitoring applications. In surveillance of critical infrastructure such as airports by sensor networks, security becomes a major concern. To resist against malicious attacks, secure communication between severely resource-constrained sensor nodes is necessary while maintaining scalability and flexibility to topology changes. A robust security solution for such networks must facilitate authentication of sensor nodes and the establishment of secret keys among nodes In this paper, we propose a decentralized authentication and key management framework for hierarchical ad hoc sensor networks. This scheme is light weight and energy aware and reduces the communication overhead.

Keywords
Authentication Wireless Sensor Networks
Published
2012-10-10
http://dx.doi.org/10.1007/978-3-642-29154-8_16
Copyright © 2010–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL