Concepedia

Publication | Closed Access

Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks

403

Citations

16

References

2009

Year

TLDR

Sensor network security research has focused on homogeneous networks, which suffer from poor performance and scalability, and existing key‑management schemes establish keys for all neighboring nodes regardless of communication, leading to high overhead. This study adopts a heterogeneous sensor network model to improve performance and security. The authors design a routing‑driven key‑management scheme that creates shared keys only between communicating neighbors and employs elliptic‑curve cryptography for efficiency. Evaluation demonstrates that the scheme delivers stronger security while substantially reducing communication overhead, storage, and energy consumption compared to prior key‑management approaches.

Abstract

Previous research on sensor network security mainly considers homogeneous sensor networks, where all sensor nodes have the same capabilities. Research has shown that homogeneous ad hoc networks have poor performance and scalability. The many-to-one traffic pattern dominates in sensor networks, and hence a sensor may only communicate with a small portion of its neighbors. Key management is a fundamental security operation. Most existing key management schemes try to establish shared keys for all pairs of neighbor sensors, no matter whether these nodes communicate with each other or not, and this causes large overhead. In this paper, we adopt a Heterogeneous Sensor Network (HSN) model for better performance and security. We propose a novel routing-driven key management scheme, which only establishes shared keys for neighbor sensors that communicate with each other. We utilize Elliptic Curve Cryptography in the design of an efficient key management scheme for sensor nodes. The performance evaluation and security analysis show that our key management scheme can provide better security with significant reductions on communication overhead, storage space and energy consumption than other key management schemes.

References

YearCitations

Page 1