Information Security Practice and Experience
DOI: 10.1007/978-3-540-72163-5_24
|View full text |Cite
|
Sign up to set email alerts
|

A Time-Based Key Management Protocol for Wireless Sensor Networks

Abstract: It is not easy to achieve secure key establishment in wireless sensor networks without public key cryptography. Many key management protocols have been proposed for the purpose. Among them, LEAP is a simple and elegant protocol that establishes multi-level keys in an efficient way, but its security mainly relies on that of a single initialization key. Though it is assumed that the initial deployment phase is secure and the key is erased from sensor nodes after the initialization in LEAP, the assumption could n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
47
0

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(47 citation statements)
references
References 13 publications
0
47
0
Order By: Relevance
“…In Table 1, we compare our model with the existing methods in the literature based on the criteria already discussed in Figure 10 and in our paper [30] and the work of the authors [33] [34]. We note that our model shows the most effective resistance to the effects of the node captures.…”
Section: Comparison With Other Schemesmentioning
confidence: 92%
“…In Table 1, we compare our model with the existing methods in the literature based on the criteria already discussed in Figure 10 and in our paper [30] and the work of the authors [33] [34]. We note that our model shows the most effective resistance to the effects of the node captures.…”
Section: Comparison With Other Schemesmentioning
confidence: 92%
“…Therefore, the vulnerability of cloning attacks remains high due to the lack of backward authentication between nodes. Additionally, the attacker can add malicious nodes to the network if he in possession of the initial master key [9]. The open broadcast nature of radio communications also makes it possible for any faulty node to be impersonated without knowing it, and hence revealing the stored keys [10].…”
Section: A Time Based Schemesmentioning
confidence: 99%
“…For example, Sencun et al [3] proposed LEAP+(Localized Encryption and Authentication Protocol) scheme.It used different keys to secure different types of communication messages in the WSN.Also it supported Inter-node Traffic Authentication.It can lead to prevent the difficulty of launching many security attacks.But the entire network would suffer a severe loss if the aninitial key was exposed to an attacker.Jang et al [4] proposed a Time-Based scheme.It proposed a secure scheme with a new notion of probabilistic time intervals.But its assumption of security in the initial deployment phase is not viable in many cases.Jia et al [5] proposed a novel key management scheme.It adopted the main idea of threshold secret sharing scheme to divide the master key into several sub keys.It can provide strong security.But it increased computation complex.…”
Section: Related Workmentioning
confidence: 99%