Abstract

With the rapid development and widespread adoption of wireless sensor networks (WSNs), security has become an increasingly prominent problem. How to establish a session key in node communication is a challenging task for WSNs. Considering the limitations in WSNs, such as low computing capacity, small memory, power supply limitations and price, we propose an efficient identity-based key management (IBKM) scheme, which exploits the Bloom filter to authenticate the communication sensor node with storage efficiency. The security analysis shows that IBKM can prevent several attacks effectively with acceptable computation and communication overhead.

Highlights

  • Wireless Sensor Networks (WSNs) are ripe for wide adoption in several applications, such as military, healthcare, automotive, research, and so on

  • Key management schemes in wireless sensor networks (WSNs) were mainly based on symmetric cryptographic algorithms or public key cryptography algorithms

  • The key management schemes based on public key cryptography algorithms could provide much simpler solutions with much stronger security resilience compared with those based on symmetric cryptographic algorithms

Read more

Summary

Introduction

Wireless Sensor Networks (WSNs) are ripe for wide adoption in several applications, such as military, healthcare, automotive, research, and so on. Implement pairings for sensor nodes based on the 8-bit/7.3828-MHz ATmega128L microcontroller (e.g., MICA 2 and MICAz motes), and they argue that pairing-based cryptography is viable in resource-constrained nodes They use Public Key Cryptography (PKC) schemes for bootstrapping security in WSNs, i.e., for generating symmetric keys to communicate or key distribution. Because of the absence of PKI and a certificate, there is no authentication in the state-of-the-art IBE schemes, which are subject to many attacks, such as the Sybil attack, the man-in-the-middle attack, etc Focused on addressing these problems, we propose an efficient identity-based key management scheme (IBKM) in this paper, which adopts an identity-based cryptosystem to distribute session keys between nodes without the complicated operations of the public key certificate; we exploit the Bloom filter to provide authentication with storage efficiency.

Related Works
Preliminaries
Computable
IBKM Scheme
Parameters Initialization Phase
Node Registration Phase
Security Analysis
Performance Evaluation
Performance of Bloom Filter
Memory Overhead
Computational Overhead
Communication Overhead
Findings
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.