IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 5    
Website: http://www.ijser.org
scirp IJSER >> Volume 3,Issue 5,May 2012
ME-SMOCK: A Memory Efficient Public Key Scheme For WSN
Full Text(PDF, )  PP.I043-I046  
Author(s)
J. Divya, Margret Johnson
KEYWORDS
— Cryptography, Key Management, Key Predistribution, Resilience, WSN
ABSTRACT
Wireless Sensor Networks (WSNs) are constructed by a set of small devices, called the sensor nodes, with sensing and wireless communication capabilities. They are widely used in many applications such as military, ecological, and health-related areas. WSNs have certain constraints like low computation capability, limited energy resources, small memory and poor resilience to physical capture. Also, they are mostly deployed in adverse or even in hostile environment. These constraints and issues make security in WSNs a challenge. So, efficient key distribution and management schemes are must. In this paper, a novel key management scheme based on deployment knowledge has been proposed which adds memory efficiency to the existing public key based integrity scheme. Using this scheme memory efficiency can be improved by minimizing the total number of keys to be stored in each sensor node without altering the security.
References
[1] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, ‚ A survey on sensor networks‛, IEEE Commun, vol.40, pp. 102-114, 2002.

[2] Yong Wang, Garhan Attebury, and Byrav Ramamurthy, ‚A survey of security issues in wireless sensor networks‛, IEEE Commun, vol.8, 2nd quarter 2006.

[3] S.Kent and T.Polk, ‚Public-key infrastructure (x.509)(pkix)charter‛, OnlineAvailable:http://www.ietf.org//html.charters/pkixcharter.html.

[4] L. Zhou and Z. J. Haas, ‚Securing Ad Hoc Network‛, IEEE Network Magazine, vol. 13, no. 6, pp. 24-30, Nov. 1999.

[5] S. Capkun, L. Buttyan, and J. P. Hubaux, ‚Self organized public-key management for mobile ad hoc networks,‛ IEEETrans. Mobile Computing, vol. 2, no. 1, pp. 52-64, January -March 2003.

[6] W. Du et al., ‚A Key Management Scheme for Wireless Sensor Networks using Deployment Knowledge,‛ Proc. IEEE INFOCOM, Hong Kong, pp. 586–97, 2004, (SHA1),‛ RFC 3174 (Informational), Sept. 2001.

[7] Wenbo He, Ying Huang, Ravishankar Sathyam, Klara Nahrstedt, and Whay C. Lee, ‚SMOCK: A Scalable method of cryptographic key management scheme for wireless ad hoc networks,‛ IEEE Transactions on Information Forensics and Security, vol. 4, no. 1, pp. 140- 150, March 2009.

Untitled Page