TY - GEN
T1 - SKEW
T2 - 2009 International Symposium on Collaborative Technologies and Systems, CTS 2009
AU - Sharifi, Mohsen
AU - Ardakani, Saeid Pourroostaei
AU - Kashi, Saeed Sedighian
PY - 2009
Y1 - 2009
N2 - Since wireless sensor networks continue to grow in usage and many sensor-based systems reside in adversarial environments, security consideration is really vital for these systems. But one of the main challenges for the efficient distribution of security keys in wireless sensor networks is the resource scarcity. This paper presents an efficient Self Key Establishment protocol for Wireless sensor networks, nicknamed SKEW, in support of in-network processing. We show that SKEW manages keys with less storage, communication, key transmission frequency, and computational overheads in comparison with similar protocols for the same purpose. All of these benefits are attained by usage of a very few number of messages for key distribution. Since SKEW preserves the network security even before start up time, it can well serve as a base security protocol for all types of security protocols in wireless sensor networks. In this protocol, none of the sensors in the network can send any packets without encryption. It also uses a key refreshing mechanism that prolongs the network security. Smart dust networks and pervasive computing environments can particularly benefit from the proposed protocol.
AB - Since wireless sensor networks continue to grow in usage and many sensor-based systems reside in adversarial environments, security consideration is really vital for these systems. But one of the main challenges for the efficient distribution of security keys in wireless sensor networks is the resource scarcity. This paper presents an efficient Self Key Establishment protocol for Wireless sensor networks, nicknamed SKEW, in support of in-network processing. We show that SKEW manages keys with less storage, communication, key transmission frequency, and computational overheads in comparison with similar protocols for the same purpose. All of these benefits are attained by usage of a very few number of messages for key distribution. Since SKEW preserves the network security even before start up time, it can well serve as a base security protocol for all types of security protocols in wireless sensor networks. In this protocol, none of the sensors in the network can send any packets without encryption. It also uses a key refreshing mechanism that prolongs the network security. Smart dust networks and pervasive computing environments can particularly benefit from the proposed protocol.
KW - Clustering
KW - Distributed wireless sensor networks
KW - Key distribution
KW - Key establishment
KW - Security protocol
KW - Wireless sensor networks
UR - http://www.scopus.com/inward/record.url?scp=70349935144&partnerID=8YFLogxK
U2 - 10.1109/CTS.2009.5067488
DO - 10.1109/CTS.2009.5067488
M3 - Conference contribution
AN - SCOPUS:70349935144
SN - 1424445841
SN - 9781424445844
T3 - 2009 International Symposium on Collaborative Technologies and Systems, CTS 2009
SP - 250
EP - 257
BT - 2009 International Symposium on Collaborative Technologies and Systems, CTS 2009
Y2 - 18 May 2009 through 22 May 2009
ER -