Key Establishment for Securing Pervasive Wireless Sensor Networks

Key Establishment for Securing Pervasive Wireless Sensor Networks

Anusree Banerjee (M S Ramaiah Institute of Technology, India), Divya P. (M S Ramaiah Institute of Technology, India), Jeevan E. L. (M S Ramaiah Institute of Technology, India) and Jibi Abraham (M S Ramaiah Institute of Technology, India)
Copyright: © 2010 |Pages: 13
DOI: 10.4018/978-1-61520-753-4.ch005
OnDemand PDF Download:
No Current Special Offers


Technological growth in embedded systems has given a leading growth for pervasive computing in today’s human world. But the possibility of leakage of private information necessitates the need for security. Confidentiality service allows concealment of messages transmitted between communicating parties from the outsiders. To achieve confidentiality, it should be able to encrypt and decrypt the messages using a secret key. The key used must be agreed upon by the parties before start transmission. This chapter gives an overview of the issues in establishing a secret key, a scheme to establish the key and its implementation results. The scheme utilizes the fact that communication in sensor networks follows a paradigm called aggregation. Keys are split into shares and forwarded using disjoint paths in the network to reduce the effect of node compromise attack. The implementation results show that even though the scheme fits properly with the available memory with the sensor nodes, its communication overhead is high.
Chapter Preview

Key Management Issues In Pervasive Wsns

The primary task of pervasive computing is to provide smart and continuous services designed according to specific requirements of users in order to enable them to live comfortably. The sensor networks used here are assumed to be collecting the context information like status of computing, resource availability, personal information of users, environmental information and temporal information. This context information may be accessed by intruders to breach their privacy. For example, a thief could analyze the wireless communication from a home automation system to find out whether there is anybody inside the house or not. Hence it is essential for a pervasive computing system to make the context information rapidly and continuously available along with preventing the unauthorized persons from blocking, impersonating, understanding or using the information.

Complete Chapter List

Search this Book: