TY - GEN
T1 - An AVL tree-based dynamic key management in hierarchical wireless sensor network
AU - Zhang, Yi Ying
AU - Yang, Wen Cheng
AU - Kim, Kee Bum
AU - Park, Myong Soon
PY - 2008
Y1 - 2008
N2 - Wireless sensor networks (WSNs) are highly vulnerable to attacks for the limitation of constrained resource and communicating via wireless links, especially running in a hostile environment such as battlefields. In such situation, an adversary may capture any node compromising critical security data including keys used for confidentiality and authentication. Consequently, it is necessary to provide security services to these networks to ensure their survival. In this paper, we present an AVL treebased dynamic key management to enhance network security and survivability. Compared to previous security solutions, the salient advantage of our work addresses challenging runtime security issues using dynamic key management scheme which is nearly realtime key renewal. The approach can efficiently protect the network against attacks of eavesdropping or captured nodes compromise, is adopted to address challenging security issues of runtime WSN. Even if the adversaries crack WSN keys, the entire network still remains safety under the timely protection of the rekey mechanism.
AB - Wireless sensor networks (WSNs) are highly vulnerable to attacks for the limitation of constrained resource and communicating via wireless links, especially running in a hostile environment such as battlefields. In such situation, an adversary may capture any node compromising critical security data including keys used for confidentiality and authentication. Consequently, it is necessary to provide security services to these networks to ensure their survival. In this paper, we present an AVL treebased dynamic key management to enhance network security and survivability. Compared to previous security solutions, the salient advantage of our work addresses challenging runtime security issues using dynamic key management scheme which is nearly realtime key renewal. The approach can efficiently protect the network against attacks of eavesdropping or captured nodes compromise, is adopted to address challenging security issues of runtime WSN. Even if the adversaries crack WSN keys, the entire network still remains safety under the timely protection of the rekey mechanism.
UR - http://www.scopus.com/inward/record.url?scp=54049088996&partnerID=8YFLogxK
U2 - 10.1109/IIH-MSP.2008.138
DO - 10.1109/IIH-MSP.2008.138
M3 - Conference contribution
AN - SCOPUS:54049088996
SN - 9780769532783
T3 - Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008
SP - 298
EP - 303
BT - Proceedings - 2008 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2008
T2 - 2008 4th International Conference on Intelligent Information Hiding and Multiedia Signal Processing, IIH-MSP 2008
Y2 - 15 August 2008 through 17 August 2008
ER -