By Topic

Securing sensor networks with location-based keys

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Yanchao Zhang ; Dept. of Electr. & Comput. Eng., Florida Univ., Gainesville, FL, USA ; Wei Liu ; Wenjing Lou ; Yuguang Fang

Wireless sensor networks are often deployed in unattended and hostile environments, leaving individual sensors vulnerable to security compromise. The paper proposes the novel notion of location-based keys for designing compromise-tolerant security mechanisms for sensor networks. Based on location-based keys, we develop a node-to-node authentication scheme, which is able not only to localize the impact of compromised nodes within their vicinity, but also to facilitate the establishment of pairwise keys between neighboring nodes. Compared with previous proposals, our scheme has perfect resilience against node compromise, low storage overhead, and good network scalability. We also demonstrate the use of location-based keys in combating a few notorious attacks against sensor network routing protocols.

Published in:

IEEE Wireless Communications and Networking Conference, 2005  (Volume:4 )

Date of Conference:

13-17 March 2005