About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
2nd International IEEE Conference on Communication System Software and Middleware

Research Article

Location dependent key management in sensor networks without using deployment knowledge

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1109/COMSWA.2007.382602,
        author={ Farooq  Anjum},
        title={Location dependent key management in sensor networks without using deployment knowledge},
        proceedings={2nd International IEEE Conference on Communication System Software and Middleware},
        publisher={IEEE},
        proceedings_a={COMSWARE},
        year={2007},
        month={7},
        keywords={Analytical models  Batteries  Costs  Knowledge management  Proposals  Public key cryptography  Sensor phenomena and characterization  Target tracking  Technology management  Wireless sensor networks},
        doi={10.1109/COMSWA.2007.382602}
    }
    
  • Farooq Anjum
    Year: 2007
    Location dependent key management in sensor networks without using deployment knowledge
    COMSWARE
    IEEE
    DOI: 10.1109/COMSWA.2007.382602
Farooq Anjum1
  • 1: Telcordia Technologies

Abstract

In this paper we propose an approach for key management in sensor networks which takes the location of sensor nodes into consideration while deciding the keys to be deployed on each node. As a result, this approach not only reduces the number of keys that have to be stored on each sensor node but also provides for the containment of node compromise. Thus compromise of a node in a location affects the communications only around that location. This approach which we call as location dependent key management does not require any knowledge about the deployment of sensor nodes. The proposed scheme starts off with loading a single key on each sensor node prior to deployment. The actual keys are then derived from this single key once the sensor nodes are deployed. The proposed scheme allows for additions of sensor nodes to the network at any point in time. We study the proposed scheme using both analysis and simulations and point out the advantages.

Keywords
Analytical models Batteries Costs Knowledge management Proposals Public key cryptography Sensor phenomena and characterization Target tracking Technology management Wireless sensor networks
Published
2007-07-09
Publisher
IEEE
Modified
2011-07-25
http://dx.doi.org/10.1109/COMSWA.2007.382602
Copyright © 2007–2025 IEEE
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL