2nd International ICST Workshop on Advances in Wireless Sensor Networks 2007

Research Article

Secure Multiple Deployment in Wireless Sensor Networks

  • @INPROCEEDINGS{10.1109/MOBIQ.2007.4451043,
        author={ Guorui  Li and Jingsha  He and  Yingfang  Fu},
        title={Secure Multiple Deployment in Wireless Sensor Networks},
        proceedings={2nd International ICST Workshop on Advances in Wireless Sensor Networks 2007},
        publisher={IEEE},
        proceedings_a={IWASN},
        year={2008},
        month={2},
        keywords={Authentication  Base stations  Communication system security  Computer science  Data security  Educational institutions  Network servers  Public key  Public key cryptography  Wireless sensor networks},
        doi={10.1109/MOBIQ.2007.4451043}
    }
    
  • Guorui Li
    Jingsha He
    Yingfang Fu
    Year: 2008
    Secure Multiple Deployment in Wireless Sensor Networks
    IWASN
    IEEE
    DOI: 10.1109/MOBIQ.2007.4451043
Guorui Li1,*, Jingsha He2,*, Yingfang Fu3,*
  • 1: College of Computer Science and Technology Beijing University of Technology Beijing 100022, Chin
  • 2: School of Software Engineering Beijing University of Technology Beijing 100022, China
  • 3: College of Computer Science and Technology Beijing University of Technology Beijing 100022, China
*Contact email: liguorui@emails.bjut.edu.cn, jhe@bjut.edu.cn, fmsik@emails.bjut.edu.cn

Abstract

As a fundamental requirement for providing security functionality in sensor networks, key management plays a central role in authentication and encryption. In this paper, we propose the adaptive key selection (AKS) scheme and the adaptive key selection algorithm for secure multiple deployment in sensor networks that target at providing high connectivity between different deployment sets of sensor nodes. Our simulation shows that the AKS scheme can greatly improve the connectivity of sensor nodes while maintaining the security of an existing multiple deployment scheme at the same time.