4.7 Article

A unified security framework with three key management schemes for wireless sensor networks

Journal

COMPUTER COMMUNICATIONS
Volume 31, Issue 18, Pages 4269-4280

Publisher

ELSEVIER
DOI: 10.1016/j.comcom.2008.05.043

Keywords

Wireless sensor networks; Key management; Symmetric keys; Public key cryptography; Node revocation

Funding

  1. IT RD program
  2. Korea Research Foundation

Ask authors/readers for more resources

Pervasive computing environments find their practical manifestations through wireless sensor networks, which sense a relationship amongst themselves and the environment. Currently the proposed keying schemes for ensuring Security. in wireless sensor networks, may be classified into public and private keying schemes, or their hybrid. However, an investigation in peer work underpins the fact that neither of these works relates the key management schemes with the granularity of key generation, distribution, renewal, and revocation. In this paper, we propose a unified security framework with three key management schemes, SACK, SACK-P, and SACK-H that incorporate symmetric key cryptography, asymmetric key cryptography and the hybrid, respectively. We have evaluated the key management schemes against a broad range of metrics such as energy, resource utilization. scalability and resilience to node compromises. Our evaluation comprises both analytical investigation and experimental validation. The results show that though SACK-P is heavy on resources, it provides maximal security and offers the best resilience to node compromises. On the contrary, SACK is very efficient in terms of storage and communication. Our results substantiate a relationship between the level of security and resource utilization and form a design benchmark for Security frameworks. (C) 2008 Elsevier B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available