2019
DOI: 10.3390/s19040914
|View full text |Cite
|
Sign up to set email alerts
|

Evaluating Dynamic Approaches to Key (Re-)Establishment in Wireless Sensor Networks

Abstract: Wireless sensor networks with a large number of cheap low-power interconnected devices bring up challenging tasks when considering the security of their communications. In our previous work, we presented two approaches for the design of dynamic protocols for link key (re-)establishment in ad hoc networks, using two elements studied earlier—secrecy amplification and key extraction from radio channel fading. The goal of this article is to provide a unified approach to the design of these protocols, together with… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…The sink node will assign different roles to different sensor nodes. As shown in Figure 1, these roles involve the sensor, ring, source, ring center, phantom, fake phantom, and sink proxy nodes; 4) All the packets are encrypted [38]. This aspect is beyond the scope of this paper; 5) Each node knows its location and relevant information pertaining to their neighboring nodes.…”
Section: System Model and Assumptions A Network Modelmentioning
confidence: 99%
“…The sink node will assign different roles to different sensor nodes. As shown in Figure 1, these roles involve the sensor, ring, source, ring center, phantom, fake phantom, and sink proxy nodes; 4) All the packets are encrypted [38]. This aspect is beyond the scope of this paper; 5) Each node knows its location and relevant information pertaining to their neighboring nodes.…”
Section: System Model and Assumptions A Network Modelmentioning
confidence: 99%
“…SA protocols have also recently been exploited in a combination with key extraction from radio channel fading, with promising results for certain types of networks and their operational environments [7,8].…”
Section: Secrecy Amplification Principles and Related Workmentioning
confidence: 99%
“…The solid lines mark a delivery path with a single selected intermediate node, C4, and the dash-dotted lines mark a delivery path with three intermediate nodes, C1, C2, and C3. The link keys used to encrypt the message are KAC4 and KC4B in the first case and KAC1, KC1C2, KC2C3, and KC3B in the second case (image from [7] © 2019 IEEE).…”
Section: Figurementioning
confidence: 99%