Classification of key management schemes for wireless sensor networks

Hwaseong Lee, Yong Ho Kim, Dong Hoon Lee, Jongin Lim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

For secure wireless sensor networks, a pair-wise key between nodes has to be established securely and efficiently. It is common to evaluate the security and efficiency of a (symmetric) key management scheme with those of other schemes without considering adversary's ability. In this paper, we defined attack models according to adversary's ability and classify existing key management schemes according to the attack models. We also suggested a guideline on selecting a proper key scheme with a given attack model. We expect our classification provides a certain criteria to fairly evaluate key management schemes in the same attack model.

Original languageEnglish
Title of host publicationAdvances in Web and Network Technologies, and Information Management - APWeb/WAIM 2007 International Workshops DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Proceedings
PublisherSpringer Verlag
Pages664-673
Number of pages10
ISBN (Print)9783540729082
DOIs
Publication statusPublished - 2007
EventApWeb/WAIM 2007 International Workshops: 1st International workshop on Database Management and Applications over Networks, DBMAN 2007 - 1st Workshop on Emerging Trends of Web Technologies and Applications, WebETrends 2007 - International Workshop on - Huang Shan, China
Duration: 2007 Jun 162007 Jun 18

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4537 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherApWeb/WAIM 2007 International Workshops: 1st International workshop on Database Management and Applications over Networks, DBMAN 2007 - 1st Workshop on Emerging Trends of Web Technologies and Applications, WebETrends 2007 - International Workshop on
Country/TerritoryChina
CityHuang Shan
Period07/6/1607/6/18

Keywords

  • Attack model
  • Guideline
  • Key management
  • Security
  • Wireless sensor networks

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Classification of key management schemes for wireless sensor networks'. Together they form a unique fingerprint.

Cite this