About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
ChinaCom2008-Network and Information Security Symposium

Research Article

Random Key Management Using Group Deployment in Large-scale Sensor Networks

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/CHINACOM.2008.4685233,
        author={Ting Yuan and Jianqing Ma and Shiyong Zhang},
        title={Random Key Management Using Group Deployment in Large-scale Sensor Networks},
        proceedings={ChinaCom2008-Network and Information Security Symposium},
        publisher={IEEE},
        proceedings_a={CHINACOM2008-NIS},
        year={2008},
        month={11},
        keywords={},
        doi={10.1109/CHINACOM.2008.4685233}
    }
    
  • Ting Yuan
    Jianqing Ma
    Shiyong Zhang
    Year: 2008
    Random Key Management Using Group Deployment in Large-scale Sensor Networks
    CHINACOM2008-NIS
    IEEE
    DOI: 10.1109/CHINACOM.2008.4685233
Ting Yuan1,*, Jianqing Ma1,*, Shiyong Zhang1,*
  • 1: Department of Computing and Information Technology Fudan University Shanghai, 200433, China
*Contact email: 061021081@fudan.edu.cn, jqma@fudan.edu.cn, szhang@fudan.edu.cn

Abstract

Dynamics of sensor networks make security one of the top issues we should pay attention to. Sensor networks can be deployed in hostile environments where their nodes are easy to be captured or re-programmed for deleterious use by an adversary. Therefore, it is necessary to protect communications between sensor nodes through cryptographic methods. To address this, symmetric key management in wireless sensor networks arises as a challenging security issue because other key management issues (e.g., asymmetric cryptography or key distribution centers) are proven undesirable for resource-limited sensor nodes. So far, several key distribution schemes have been proposed to solve key management problems. In this paper, we propose a random key management scheme, which organizes sensor nodes into groups and uses multiple key pools to achieve higher security in largescale sensor networks. Through security analysis and simulations, our scheme is shown to be better resilient against node capture than certain existing schemes.

Published
2008-11-21
Publisher
IEEE
Modified
2010-05-16
http://dx.doi.org/10.1109/CHINACOM.2008.4685233
Copyright © 2008–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL