A Study on Trusted Communication in Wireless Networks
Keywords:
Wireless, Authentication, Sensor network, Trust managementAbstract
Several algorithms are proposed which uses the basic scheme by predistributing random keys into nodes. The drawback is that one pair wise key may be shared by multiple links. Chan et al. presented two schemes. In their q-composite scheme, multiple keys are required to establish a secure link, which makes a trade-off between connectivity and security. In their random pair wise-key scheme, a unique pair wise key is assigned to each node and every one of a random set. This scheme provides high security but poses an upper bound on network size. Du et al. proposed the pair wise key predistribution scheme based on both the basic scheme and Blom’s scheme, from which it inherits the threshold property. On the contrary, our scheme utilizes Blom’s scheme more smoothly
References
[1] H.DaiandH.Xu,―Triangle-basedkeymanagement scheme for wireless sensor networks," Frontiers Electrical Electron. Eng. China, vol. 4, no. 3, pp. 300-306,2009.
[2] A.PoornimaandB.Amberker,―Tree-basedkey management scheme for heterogeneous sensor networks," in 16th IEEE International Conf. Netw.,2008.
[3] Y.Zhang,W.Yang,K.Kim,andM.Park,―AnAVLtree- based dynamic key management in hierarchical wireless sensor network," in Proc. International Conf. Intelligent Inf. Hiding Multimedia Signal Process., pp. 298-303,2008.
[4] A.PoornimaandB.Amberker,―Keymanagement schemes for secure communication in heterogeneous sensor networks," International J. Recent Trends Eng.,2009.
[5] A. Das, ―An unconditionally secure key management scheme for largescale heterogeneous wireless sensor networks," in Proc. First International Commun. Syst. Netw. Workshops, pp. 1-10,2009.
[6] Y.Yang,J.Zhou,R.Deng,andF.Bao,―Hierarchicalself- healing key distribution for heterogeneous wireless sensor networks," SecurityPrivacyCommun.Netw., pp. 285-295, 2009.
[7] B. Tian, S. Han, and T. Dillon, ―A key management scheme for heterogeneous sensor networks using keyed-hash chain," in 5th International Conf. Mobile Ad-hoc Sensor Netw.,2010.
[8] J.Kim,J.Lee,andK.Rim,―Energyefficientkey management protocol in wireless sensor networks," International J. Security its Appl.,2010.
[9] M.Wen,Z.Yin,Y.Long,andY.Wang,―Anadaptivekey management framework for the wireless mesh and sensor networks," Wireless Sensor Netw.J.,2010.
[10] H.Jen-Yan,I.Liao,andH.Tang,―Aforward authentication key management scheme for heterogeneous sensor networks," EURASIP J. Wireless Commun.Netw., 2010.
[11] utilizing probabilistic key predistribution, which was improved byChanet al. And Duet al. Recently, Duet al.And Liu and Ning independently proposed to make use of deployment knowledge to further improve the performance of key establishment. Different from all these schemes, LEAP proposed by Zhu et al. assumes a weaker model, that is, there exists a short time interval within which nodes can establish pair wise keys safely after deployment.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
