Scheduled System Maintenance:
On May 6th, single article purchases and IEEE account management will be unavailable from 8:00 AM - 5:00 PM ET (12:00 - 21:00 UTC). We apologize for the inconvenience.
By Topic

Dynamic updating based key management algorithm for wireless sensor networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Yunhua Rao ; Electron. & Inf. Sch., Wuhan Univ., Wuhan, China ; Jinhua Wang ; Rong Tian ; Fengyuan Zhu

In wireless sensor networks, sensor nodes are inherently restricted by insufficient hardware resources, such as computing capacity and battery lifetime. As a result, current key management schemes are difficult to be deployed in wireless sensor networks. This paper proposes a new key management method that the shared keys are dynamic updated for wireless sensor networks. The proposed scheme loads two hash functions and an initial key into the base station, cluster heads, and sensor nodes. Every node including the cluster heads and sensor node authenticates its neighbor nodes with the initial key. Then every node establishes pair wise key with each of its neighbor node to ensure transmission secrecy. The pair wise keys are updated between node and its neighbors within a random interval time, which is triggered by the base station. The security of this scheme is analyzed and it shows that it is robust to the guessing attacks, replay attacks, man-in-the-middle attacks and node capture attacks. The results show this scheme can also save communication resources.

Published in:

Wireless Communications and Signal Processing (WCSP), 2011 International Conference on

Date of Conference:

9-11 Nov. 2011