A High Security Dynamic Secret Key Management Scheme for Wireless Sensor Networks

It's very important to find an efficient method of secret key management to guarantee secure communication in wireless sensor networks. In this paper, a cluster-based dynamic secret key management scheme has been proposed. A pairwise key has been established through OR and XOR operations in thi...

Full description

Saved in:
Bibliographic Details
Published in2010 Third International Symposium on Intelligent Information Technology and Security Informatics pp. 507 - 510
Main Authors Lanying Li, Xin Wang
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.04.2010
Subjects
Online AccessGet full text
ISBN9781424467303
1424467306
DOI10.1109/IITSI.2010.46

Cover

Loading…
Abstract It's very important to find an efficient method of secret key management to guarantee secure communication in wireless sensor networks. In this paper, a cluster-based dynamic secret key management scheme has been proposed. A pairwise key has been established through OR and XOR operations in this scheme since its low energy and limited memory space of a sensor node. These OR and XOR operations not only save energy of sensors but also with high efficiency. The keys between sensors can be updated, which can strengthen the security of the wireless sensor networks. Finally, the simulation results proved that the scheme has high security and low energy cost compared with other schemes.
AbstractList It's very important to find an efficient method of secret key management to guarantee secure communication in wireless sensor networks. In this paper, a cluster-based dynamic secret key management scheme has been proposed. A pairwise key has been established through OR and XOR operations in this scheme since its low energy and limited memory space of a sensor node. These OR and XOR operations not only save energy of sensors but also with high efficiency. The keys between sensors can be updated, which can strengthen the security of the wireless sensor networks. Finally, the simulation results proved that the scheme has high security and low energy cost compared with other schemes.
Author Xin Wang
Lanying Li
Author_xml – sequence: 1
  surname: Lanying Li
  fullname: Lanying Li
  email: lulu08521@sina.com
  organization: Dept. of Comput. Sci. & Technol., Harbin Univ. of Sci. & Technol., Harbin, China
– sequence: 2
  surname: Xin Wang
  fullname: Xin Wang
  email: wxlczwx@126.com
  organization: Dept. of Comput. Sci. & Technol., Harbin Univ. of Sci. & Technol., Harbin, China
BookMark eNpNjMtOwzAURI0ACShZsmLjH2ixff3KsiqPRhQQShHLyqQ3raFxkB2E8vekggWzmTmj0ZyRo9AGJOSCswnnLL8qimVZTAQbWOoDkuXGcimk1EYCHP5nYHBCspTe2SCpuDVwSp6ndO43W1pi9RV919PrPrjGV_siYkfvsacPLrgNNhg6WlbbIdC6jfTVR9xhSsMypIEfsftu40c6J8e12yXM_nxEXm5vlrP5ePF0V8ymi7HnRnXjNTihHFcWmLUgqwFz9mZRCy0qszZaSONQKG1drQRaJ5Uzal-6WmpAGJHL31-PiKvP6BsX-5WSCjRT8APVJFDR
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/IITSI.2010.46
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISBN 9781424467433
1424467438
EndPage 510
ExternalDocumentID 5453605
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ADFMO
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i175t-d3a25a158308834c3a290b8e6262c7d76247ae2568af52e8a45a75247aaf463e3
IEDL.DBID RIE
ISBN 9781424467303
1424467306
IngestDate Wed Aug 27 02:27:32 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-d3a25a158308834c3a290b8e6262c7d76247ae2568af52e8a45a75247aaf463e3
PageCount 4
ParticipantIDs ieee_primary_5453605
PublicationCentury 2000
PublicationDate 2010-April
PublicationDateYYYYMMDD 2010-04-01
PublicationDate_xml – month: 04
  year: 2010
  text: 2010-April
PublicationDecade 2010
PublicationTitle 2010 Third International Symposium on Intelligent Information Technology and Security Informatics
PublicationTitleAbbrev IITSI
PublicationYear 2010
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000451873
Score 1.4739206
Snippet It's very important to find an efficient method of secret key management to guarantee secure communication in wireless sensor networks. In this paper, a...
SourceID ieee
SourceType Publisher
StartPage 507
SubjectTerms Computer network management
Computer science
Computer security
Electronic mail
Energy consumption
Energy management
Information security
key establishment
key management scheme
Space technology
Technology management
Wireless sensor networks
Title A High Security Dynamic Secret Key Management Scheme for Wireless Sensor Networks
URI https://ieeexplore.ieee.org/document/5453605
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFG-QkydUMH6nB48Wxtpu3dGoBDQQDZBwI133Go1mEBgH_et93QcY48Fb38uWNF33Ptrf-z1Crj3cJsqTikktLBMWLIslABMmUIGSJjGhqx0ejoL-VDzO5KxGbra1MACQg8-g7Yb5XX6yMBt3VNZBb88DR1i6h4lbUau1PU9xPCkq5FXtVoA7N6gonUqZ7zg2O4PBZDwokF0u9v3RWSV3LL0GGVZTKvAk7-1NFrfN1y-2xv_O-YC0diV89HnrnA5JDdIj0qh6ONDyl26Sl1vqoB50XPaxo_dFi3qnWEFGn-CT7iAy-N4rDihGutThZj_QTuKT6RrlUQEoX7fItPcwueuzss0Ce8PYIWMJ177UXak4WhwuDIqRFyvAVMc3YYLWUoQaMDRS2koflBZSh9IptRUBB35M6ukihRNChQ_gC2ljg4lj1xqtI-sqez0hIDJRckqaboXmy4JJY14uztnf6nOyX9zVO5zMBalnqw1cYgiQxVf5t_8Gluaskw
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDI6mcYDTgA3xJgeOdOuapE2PCJg29hBom7TblKaOQKAObd0Bfj1OHxtCHLjZUStFkWM7yffZhFy7aCbSFdIRihuHGzBOJAAcrn3pS6FjHVju8HDkd6f8cSZmFXKz4cIAQAY-g6YVs7f8eKHX9qqshdGe-bZg6Q5KPMzZWpsbFVspRQasZG_5aLt-WdSp0Nm2ymar15uMezm2y2a_P3qrZKGlUyPDclI5ouStuU6jpv76Va_xv7PeJ40tiY8-bcLTAalAckhqZRcHWmzqOnm-pRbsQcdFJzt6nzeptwNLSGkfPukWJIP_vaBAMdelFjn7jp4Sv0xWqI9ySPmqQaadh8ld1ykaLTivmD2kTsyUJ1RbSIY-h3GNauhGEvCw4-kgRn_JAwWYHEllhAdScaECYQeV4T4DdkSqySKBY0K5B-BxYSKNR8e20UqFxnJ7Xc4h1GF8Qup2heYfeS2NebE4p38PX5Hd7mQ4mA96o_4Z2ctf7i1q5pxU0-UaLjAhSKPLzA6-AdtXr-M
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+Third+International+Symposium+on+Intelligent+Information+Technology+and+Security+Informatics&rft.atitle=A+High+Security+Dynamic+Secret+Key+Management+Scheme+for+Wireless+Sensor+Networks&rft.au=Lanying+Li&rft.au=Xin+Wang&rft.date=2010-04-01&rft.pub=IEEE&rft.isbn=9781424467303&rft.spage=507&rft.epage=510&rft_id=info:doi/10.1109%2FIITSI.2010.46&rft.externalDocID=5453605
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424467303/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424467303/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424467303/sc.gif&client=summon&freeimage=true