Effective Key Management in Dynamic Wireless Sensor Networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Seo, Seung-Hyun | - |
dc.contributor.author | Won, Jongho | - |
dc.contributor.author | Sultana, Salmin | - |
dc.contributor.author | Bertino, Elisa | - |
dc.date.accessioned | 2021-09-04T19:28:13Z | - |
dc.date.available | 2021-09-04T19:28:13Z | - |
dc.date.created | 2021-06-15 | - |
dc.date.issued | 2015-02 | - |
dc.identifier.issn | 1556-6013 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/94445 | - |
dc.description.abstract | Recently, wireless sensor networks (WSNs) have been deployed for a wide variety of applications, including military sensing and tracking, patient status monitoring, traffic flow monitoring, where sensory devices often move between different locations. Securing data and communications requires suitable encryption key protocols. In this paper, we propose a certificateless-effective key management (CL-EKM) protocol for secure communication in dynamic WSNs characterized by node mobility. The CL-EKM supports efficient key updates when a node leaves or joins a cluster and ensures forward and backward key secrecy. The protocol also supports efficient key revocation for compromised nodes and minimizes the impact of a node compromise on the security of other communication links. A security analysis of our scheme shows that our protocol is effective in defending against various attacks. We implement CL-EKM in Contiki OS and simulate it using Cooja simulator to assess its time, energy, communication, and memory performance. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.subject | ELLIPTIC CURVE CRYPTOGRAPHY | - |
dc.title | Effective Key Management in Dynamic Wireless Sensor Networks | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Seo, Seung-Hyun | - |
dc.identifier.doi | 10.1109/TIFS.2014.2375555 | - |
dc.identifier.scopusid | 2-s2.0-84921344790 | - |
dc.identifier.wosid | 000352560400013 | - |
dc.identifier.bibliographicCitation | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, v.10, no.2, pp.371 - 383 | - |
dc.relation.isPartOf | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | - |
dc.citation.title | IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY | - |
dc.citation.volume | 10 | - |
dc.citation.number | 2 | - |
dc.citation.startPage | 371 | - |
dc.citation.endPage | 383 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordPlus | ELLIPTIC CURVE CRYPTOGRAPHY | - |
dc.subject.keywordAuthor | Wireless sensor networks | - |
dc.subject.keywordAuthor | certificateless public key cryptography | - |
dc.subject.keywordAuthor | key management scheme | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
145 Anam-ro, Seongbuk-gu, Seoul, 02841, Korea+82-2-3290-2963
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.