Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks

Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks

Jingyuan Rao, Min Tu, Xuanjin Yang
Copyright: © 2020 |Pages: 14
DOI: 10.4018/IJDCF.2020070101
Article PDF Download
Open access articles are freely available for download

Abstract

Recently, the issue pertinent to sensor network security is a popular topic. Especially, due to the restriction of energy supplied by battery power of the sensors, symmetric cryptography is one of the suitable choices for the secret communication between sensors, while asymmetric cryptography is not appropriate because of its heavy loading on computation should consume a lot of energy. As a result of using symmetric cryptography, there are numerous research papers focusing on designing efficient key management scheme in sensor networks. PIKE designed by Chan and Perrig is a scheme using peer intermediaries and their pre-installed keys to deliver secret message from one sensor to another. However, they did not consider the case that the sensors are scattered in nonuniform way. Moreover, O(logn) is enough for sensor networks to achieve expander topology while PIKE has O(√n) storage overhead. This article gives generalizations of PIKE to offer more choices for developers under different requirements. The Constant Storage Protocol, abbreviated as CSP, costs constant memory storage and is more suitable for group-based deployment.
Article Preview
Top

1. Introduction

1.1. Background

Sensor networks may be deployed at any area we want to monitor, including the hostile environment. Under this situation, the communication between any two sensors can be eavesdropped by the adversary to compromise the confidentiality of transmitted message. Thus, secure communication is an essential issue in sensor networks. To provide secure communication, exchanged message between sensor nodes should be encrypted and authenticated. In wireless sensor networks, sensors have limited energy supply that usually cannot be renewed. The lifetime of a sensor network is constrained by the amount of energy that sensors can use to perform operations such as sensing, processing, and transmission. When cryptography is used to ensure the confidentiality of transmitted data, the encryption/decryption procedure needs exquisite designs in order to save energy. Because asymmetric cryptography such as RSA or Elliptic Curve cryptography (ECC) needs extensive computations, they are usually considered to be unsuitable for resource-limited sensor networks (Eschenaur & Gligor, 2002). In this paper, we force on designing key management schemes to achieve secure communication in sensor networks.

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024)
Volume 15: 1 Issue (2023)
Volume 14: 3 Issues (2022)
Volume 13: 6 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing