Online citations, reference lists, and bibliographies.
← Back to Search

Transactions Papers A Routing-driven Elliptic Curve Cryptography Based Key Management Scheme For Heterogeneous Sensor Networks

Xiaojiang Du, M. Guizani, Y. Xiao, H. Chen
Published 2009 · Computer Science, Mathematics

Cite This
Download PDF
Analyze on Scholarcy
Share
Previous research on sensor network security mainly considers homogeneous sensor networks, where all sensor nodes have the same capabilities. Research has shown that homogeneous ad hoc networks have poor performance and scalability. The many-to-one traffic pattern dominates in sensor networks, and hence a sensor may only communicate with a small portion of its neighbors. Key management is a fundamental security operation. Most existing key management schemes try to establish shared keys for all pairs of neighbor sensors, no matter whether these nodes communicate with each other or not, and this causes large overhead. In this paper, we adopt a Heterogeneous Sensor Network (HSN) model for better performance and security. We propose a novel routing-driven key management scheme, which only establishes shared keys for neighbor sensors that communicate with each other. We utilize Elliptic Curve Cryptography in the design of an efficient key management scheme for sensor nodes. The performance evaluation and security analysis show that our key management scheme can provide better security with significant reductions on communication overhead, storage space and energy consumption than other key management schemes.
This paper references
10.1145/1031495.1031519
A system for simulation, emulation, and deployment of heterogeneous sensor networks
L. Girod (2004)
10.1145/586110.586117
A key-management scheme for distributed sensor networks
Laurent Eschenauer (2002)
10.1016/0166-218x(90)90038-e
A Course in Number Theory and Cryptography
N. Koblitz (1987)
10.1109/SECPRI.2003.1199337
Random key predistribution schemes for sensor networks
H. Chan (2003)
10.1090/S0025-5718-1987-0866109-5
Elliptic curve cryptosystems
N. Koblitz (1987)
10.1007/978-3-540-28632-5_9
Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs
N. Gura (2004)
10.1016/S1389-1286(03)00357-8
Data-gathering wireless sensor networks: organization and capacity
Enrique J. Duarte-Melo (2003)
10.1109/INFCOM.2005.1498318
Exploiting heterogeneity in sensor networks
M. Yarvis (2005)
10.1017/cbo9781107360211
Elliptic Curves in Cryptography
I. Blake (1999)
10.1145/990064.990079
Hood: a neighborhood abstraction for sensor networks
K. Whitehouse (2004)
10.1109/TIT.2006.874536
Lossy network correlated data gathering with high-resolution coding
R. Cristescu (2006)
10.1145/313451.313558
Next century challenges: mobile networking for “Smart Dust”
J. Kahn (1999)
GPSR : Greedy Perimeter Stateless Routing for Wireless
B. Karp (2000)
Mobile networking for smart dust
J. Kahn (1999)
10.1155/WCN.2005.565
Maintaining Differentiated Coverage in Heterogeneous Sensor Networks
Xiaojiang Du (2005)
10.1145/1023646.1023650
SeRLoc: secure range-independent localization for wireless sensor networks
L. Lazos (2004)
10.1504/IJWMC.2006.012471
Energy efficient Chessboard Clustering and routing in heterogeneous sensor networks
Xiaojiang Du (2006)
10.1109/18.825799
The capacity of wireless networks
P. Gupta (2000)
10.1109/ICC.2002.997415
An ad hoc network with mobile backbones
Kaixin Xu (2002)
and D
K. Whitehouse (2004)
10.1016/S0743-7315(02)00058-8
Landmark routing in ad hoc networks with mobile backbones
Kaixin Xu (2003)



This paper is referenced by
10.1109/ICCChina.2017.8330529
Game theoretic study on blockchain based secure edge networks
Dongjin Xu (2017)
10.1007/978-3-319-69137-4_23
How Mobile Nodes Influence Wireless Sensor Networks Security and Lifetime
Mohammed Said Salah (2017)
10.1109/JIOT.2018.2878406
LRCoin: Leakage-Resilient Cryptocurrency Based on Bitcoin for Data Trading in IoT
Y. Yu (2019)
10.1007/978-3-030-14234-6_34
An Efficient Anonymous Authentication Scheme Based on Double Authentication Preventing Signature for Mobile Healthcare Crowd Sensing
J. Liu (2018)
10.1109/ICC.2019.8761845
On Physical Layer Security in Energy-Efficient Wireless Health Monitoring Applications
Belal Essam ElDiwany (2019)
10.1109/TVT.2019.2910217
Evaluating Reputation Management Schemes of Internet of Vehicles Based on Evolutionary Game Theory
Zhihong Tian (2019)
10.3390/APP9030437
A Correlation-Change Based Feature Selection Method for IoT Equipment Anomaly Detection
S. Su (2019)
in Wireless Sensor Networks
Hyper Elliptic (2015)
10.15623/IJRET.2016.0505036
A NEW IMAGE ENCRYPTION AND DATA HIDING TECHNIQUE USING WAVELET TRANSFORM
M. Dileep (2016)
10.1142/S0219265909002662
Secure Anonymous Communication for Wireless Sensor Networks Based on Pairing over Elliptic Curves
Sk. Md. Mizanur Rahman (2009)
10.1007/978-3-030-24268-8_42
High-Speed File Transferring Over Linux Bridge for QGA Enhancement in Cyber Range
Jiajun Xie (2019)
10.1002/wcm.2675
CAPR: context-aware participant recruitment mechanism in mobile crowdsourcing
H. Zhang (2016)
10.1007/978-981-10-8890-2_4
A Hierarchical Framework for Evaluation of Cloud Service Qualities
Q. Wang (2017)
10.1007/978-3-642-22543-7_7
Binary Tree Based Cluster Key Management Scheme for Heterogeneous Sensor Networks
Rajender Dharavath (2011)
10.1109/PERCOMW.2011.5766865
Secure cooperative MIMO communications under active compromised nodes
Liang Hong (2011)
10.1109/ICCCNT.2012.6395920
Towards an approach for improved security in wireless sensor networks
T. Thenmozhi (2012)
10.3390/s140814786
Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
Bruce Ndibanje (2014)
10.1016/j.ins.2018.02.015
Efficient attribute-based encryption with attribute revocation for assured data deletion
Liang Xue (2019)
10.1177/1550147719899374
Hierarchically defining Internet of Things security: From CIA to CACA
Lihua Yin (2020)
10.3390/app10010413
An Automated Refactoring Approach to Improve IoT Software Quality
Y. Zhang (2020)
10.1109/MNET.001.1900140
Data Security and Privacy Challenges of Computing Offloading in FINs
F. Wang (2020)
10.1109/ACCESS.2018.2805783
Consortium Blockchain-Based Malware Detection in Mobile Devices
Jingjing Gu (2018)
10.1109/ICCNC.2018.8390335
PWiG: A Phase-based Wireless Gesture Recognition System
Dapeng Man (2018)
10.1109/GLOCOM.2018.8647973
Classification of Small UAVs Based on Auxiliary Classifier Wasserstein GANs
Caidan Zhao (2018)
10.1109/MCOM.2018.1701086
Content Protection in Named Data Networking: Challenges and Potential Solutions
Y. Yu (2018)
10.1016/j.future.2019.08.016
A stealthy covert storage channel for asymmetric surveillance VoLTE endpoints
Quanxin Zhang (2020)
10.1109/MNET.001.1900156
Fog Intelligence for Network Anomaly Detection
K. Yang (2020)
10.1109/GLOBECOM38437.2019.9013447
A Genetic-Algorithm Based Method for Storage Location Assignments in Mobile Rack Warehouses
Dongwen Zhang (2019)
10.1109/ICC.2019.8761951
A Novel Secure Authentication Scheme for Heterogeneous Internet of Things
Jingwei Liu (2019)
10.1016/j.ins.2018.10.056
Establishing a software defect prediction model via effective dimension reduction
H. Wei (2019)
10.1109/ICCNC.2018.8390283
The Identification of Secular Variation in IoT Based on Transfer Learning
Caidan Zhao (2018)
10.1109/JIOT.2019.2951620
Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles
Zhihong Tian (2020)
See more
Semantic Scholar Logo Some data provided by SemanticScholar