By Topic

A robust group-based key management scheme for wireless sensor networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Zhen Yu ; Dept. of Electr. & Comput. Eng., Iowa State Univ., Ames, IA, USA ; Yong Guan

Sensor networks pose security and privacy challenges. To maintain confidentiality of sensor communications, it is challenging to bootstrap secure communications among sensors while making sensor networks highly connected when sensors are randomly deployed. Several existing key management schemes either cannot offer strong resilience against node capture attacks or have overly large memory requirement to achieve a high degree of connectivity, which is measured as the fraction of the size of the largest connected component over the size of the entire sensor network. We propose a group-based key pre-distribution scheme using sensor deployment knowledge. In our scheme, we partition a sensor field into a hexagonal grid. Sensor nodes are divided into groups, each of which is deployed into a cell of the grid. Our scheme consists of a series of slightly different methods, depending on how to distribute secret information among neighboring groups and how much information is to be stored in each node. Experimental results show that our scheme achieves a higher degree of connectivity of the sensor network with a lower memory requirement compared to existing schemes. In addition, our scheme offers a stronger resilience against node capture attacks.

Published in:

IEEE Wireless Communications and Networking Conference, 2005  (Volume:4 )

Date of Conference:

13-17 March 2005