Publication | Closed Access
Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks
403
Citations
16
References
2009
Year
EngineeringInformation SecurityHeterogeneous Sensor NetworksSensor ConnectivityPublic Key AlgorithmTransactions PapersAd Hoc NetworkInternet Of ThingsSecure ProtocolElliptic Curve CryptographyComputer EngineeringLightweight CryptographyKey Management SchemeComputer ScienceKey ManagementData SecurityCryptographyEdge ComputingSecure Routing
Sensor network security research has focused on homogeneous networks, which suffer from poor performance and scalability, and existing key‑management schemes establish keys for all neighboring nodes regardless of communication, leading to high overhead. This study adopts a heterogeneous sensor network model to improve performance and security. The authors design a routing‑driven key‑management scheme that creates shared keys only between communicating neighbors and employs elliptic‑curve cryptography for efficiency. Evaluation demonstrates that the scheme delivers stronger security while substantially reducing communication overhead, storage, and energy consumption compared to prior key‑management approaches.
Previous research on sensor network security mainly considers homogeneous sensor networks, where all sensor nodes have the same capabilities. Research has shown that homogeneous ad hoc networks have poor performance and scalability. The many-to-one traffic pattern dominates in sensor networks, and hence a sensor may only communicate with a small portion of its neighbors. Key management is a fundamental security operation. Most existing key management schemes try to establish shared keys for all pairs of neighbor sensors, no matter whether these nodes communicate with each other or not, and this causes large overhead. In this paper, we adopt a Heterogeneous Sensor Network (HSN) model for better performance and security. We propose a novel routing-driven key management scheme, which only establishes shared keys for neighbor sensors that communicate with each other. We utilize Elliptic Curve Cryptography in the design of an efficient key management scheme for sensor nodes. The performance evaluation and security analysis show that our key management scheme can provide better security with significant reductions on communication overhead, storage space and energy consumption than other key management schemes.
| Year | Citations | |
|---|---|---|
Page 1
Page 1