By Topic

Securing Wireless Sensor Networks Using Cluster Reformations

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Gicheol Wang ; Res. Center for Ubiquitous Inf. Appliances, Gwangju ; Deokjai Choi ; Daewook Kang

In sensor networks, sensors are prone to be compromised by attackers because they are deployed in an unattended environment. Then, attackers can employ the keys of the compromised sensors to uncover the sensor readings and even modify them to lead an unsuitable decision of the user. To resolve the problem, it is important to refresh communication keys of sensors in a periodic or on-demand manner. In this paper, we propose a key refreshment scheme which is immune to the increase of the compromised nodes. In our scheme, each member in a cluster uses a pairwise key which is different from those of other members, so the compromise of a sensor reveals no transmissions from other members. Besides, our scheme explicitly evicts the compromised sensors by virtue of periodic cluster reformations. Simulation results showed that our scheme is more tolerant to the compromised sensors while it is more energy-efficient than SHELL.

Published in:

Embedded and Ubiquitous Computing, 2008. EUC '08. IEEE/IFIP International Conference on  (Volume:2 )

Date of Conference:

17-20 Dec. 2008