Computer Science – Cryptography and Security
Scientific paper
2011-08-05
Computer Science
Cryptography and Security
Published in International Journal of Computer Networks & Communications (IJCNC) Vol.3, No.4, July 2011
Scientific paper
10.5121/ijcnc.2011.3405
Establishment of pairwise keys between sensor nodes in a sensor network is a difficult problem due to resource limitations of sensor nodes as well as vulnerability to physical captures of sensor nodes by the enemy. Public-key cryptosystems are not much suited for most resource-constrained sensor networks. Recently, elliptic curve cryptographic techniques show that public key cryptosystem is also feasible for resource-constrained sensor networks. However, most researchers accept that the symmetric key cryptosystems are viable options for resource-constrained sensor networks. In this paper, we first develop a basic principle to address the key pre-distribution problem in mobile sensor networks. Then, using this developed basic principle, we propose a scheme which takes the advantage of the post-deployment knowledge. Our scheme is a modified version of the key prioritization technique proposed by Liu and Ning. Our improved scheme provides reasonable network connectivity and security. Moreover, the proposed scheme works for any deployment topology.
No associations
LandOfFree
A Key Establishment Scheme for Mobile Wireless Sensor Networks Using Post-Deployment Knowledge does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with A Key Establishment Scheme for Mobile Wireless Sensor Networks Using Post-Deployment Knowledge, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and A Key Establishment Scheme for Mobile Wireless Sensor Networks Using Post-Deployment Knowledge will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-668435