Communication Pattern Based Key Establishment Scheme in Heterogeneous Wireless Sensor Networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Daehee | - |
dc.contributor.author | Kim, Dongwan | - |
dc.contributor.author | An, Sunshin | - |
dc.date.accessioned | 2021-09-04T01:19:22Z | - |
dc.date.available | 2021-09-04T01:19:22Z | - |
dc.date.created | 2021-06-17 | - |
dc.date.issued | 2016-03-31 | - |
dc.identifier.issn | 1976-7277 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/89179 | - |
dc.description.abstract | In this paper, we propose a symmetric key establishment scheme for wireless sensor networks which tries to minimize the resource usage while satisfying the security requirements. This is accomplished by taking advantage of the communication pattern of wireless sensor networks and adopting heterogeneous wireless sensor networks. By considering the unique communication pattern of wireless sensor networks due to the nature of information gathering from the physical world, the number of keys to be established is minimized and, consequently, the overhead spent for establishing keys decreases. With heterogeneous wireless sensor networks, we can build a hybrid scheme where a small number of powerful nodes do more works than a large number of resource-constrained nodes to provide enhanced security service such as broadcast authentication and reduce the burden of resource-limited nodes. In addition, an on-demand key establishment scheme is introduced to support extra communications and optimize the resource usage. Our performance analysis shows that the proposed scheme is very efficient and highly scalable in terms of storage, communication and computation overhead. Furthermore, our proposed scheme not only satisfies the security requirements but also provides resilience to several attacks. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | KSII-KOR SOC INTERNET INFORMATION | - |
dc.subject | MANAGEMENT SCHEME | - |
dc.subject | SECURITY | - |
dc.title | Communication Pattern Based Key Establishment Scheme in Heterogeneous Wireless Sensor Networks | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | An, Sunshin | - |
dc.identifier.doi | 10.3837/tiis.2016.03.017 | - |
dc.identifier.scopusid | 2-s2.0-84964078770 | - |
dc.identifier.wosid | 000373933700017 | - |
dc.identifier.bibliographicCitation | KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, v.10, no.3, pp.1249 - 1272 | - |
dc.relation.isPartOf | KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | - |
dc.citation.title | KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | - |
dc.citation.volume | 10 | - |
dc.citation.number | 3 | - |
dc.citation.startPage | 1249 | - |
dc.citation.endPage | 1272 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.identifier.kciid | ART002165185 | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.description.journalRegisteredClass | kci | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | MANAGEMENT SCHEME | - |
dc.subject.keywordPlus | SECURITY | - |
dc.subject.keywordAuthor | Wireless sensor networks | - |
dc.subject.keywordAuthor | communication pattern | - |
dc.subject.keywordAuthor | heterogeneous wireless sensor networks | - |
dc.subject.keywordAuthor | key establishment | - |
dc.subject.keywordAuthor | on-demand | - |
dc.subject.keywordAuthor | broadcast authentication | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.