A High Security Dynamic Secret Key Management Scheme for Wireless Sensor Networks
It's very important to find an efficient method of secret key management to guarantee secure communication in wireless sensor networks. In this paper, a cluster-based dynamic secret key management scheme has been proposed. A pairwise key has been established through OR and XOR operations in thi...
Saved in:
Published in | 2010 Third International Symposium on Intelligent Information Technology and Security Informatics pp. 507 - 510 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.04.2010
|
Subjects | |
Online Access | Get full text |
ISBN | 9781424467303 1424467306 |
DOI | 10.1109/IITSI.2010.46 |
Cover
Loading…
Abstract | It's very important to find an efficient method of secret key management to guarantee secure communication in wireless sensor networks. In this paper, a cluster-based dynamic secret key management scheme has been proposed. A pairwise key has been established through OR and XOR operations in this scheme since its low energy and limited memory space of a sensor node. These OR and XOR operations not only save energy of sensors but also with high efficiency. The keys between sensors can be updated, which can strengthen the security of the wireless sensor networks. Finally, the simulation results proved that the scheme has high security and low energy cost compared with other schemes. |
---|---|
AbstractList | It's very important to find an efficient method of secret key management to guarantee secure communication in wireless sensor networks. In this paper, a cluster-based dynamic secret key management scheme has been proposed. A pairwise key has been established through OR and XOR operations in this scheme since its low energy and limited memory space of a sensor node. These OR and XOR operations not only save energy of sensors but also with high efficiency. The keys between sensors can be updated, which can strengthen the security of the wireless sensor networks. Finally, the simulation results proved that the scheme has high security and low energy cost compared with other schemes. |
Author | Xin Wang Lanying Li |
Author_xml | – sequence: 1 surname: Lanying Li fullname: Lanying Li email: lulu08521@sina.com organization: Dept. of Comput. Sci. & Technol., Harbin Univ. of Sci. & Technol., Harbin, China – sequence: 2 surname: Xin Wang fullname: Xin Wang email: wxlczwx@126.com organization: Dept. of Comput. Sci. & Technol., Harbin Univ. of Sci. & Technol., Harbin, China |
BookMark | eNpNjMtOwzAURI0ACShZsmLjH2ixff3KsiqPRhQQShHLyqQ3raFxkB2E8vekggWzmTmj0ZyRo9AGJOSCswnnLL8qimVZTAQbWOoDkuXGcimk1EYCHP5nYHBCspTe2SCpuDVwSp6ndO43W1pi9RV919PrPrjGV_siYkfvsacPLrgNNhg6WlbbIdC6jfTVR9xhSsMypIEfsftu40c6J8e12yXM_nxEXm5vlrP5ePF0V8ymi7HnRnXjNTihHFcWmLUgqwFz9mZRCy0qszZaSONQKG1drQRaJ5Uzal-6WmpAGJHL31-PiKvP6BsX-5WSCjRT8APVJFDR |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/IITSI.2010.46 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISBN | 9781424467433 1424467438 |
EndPage | 510 |
ExternalDocumentID | 5453605 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ADFMO ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IERZE OCL RIE RIL |
ID | FETCH-LOGICAL-i175t-d3a25a158308834c3a290b8e6262c7d76247ae2568af52e8a45a75247aaf463e3 |
IEDL.DBID | RIE |
ISBN | 9781424467303 1424467306 |
IngestDate | Wed Aug 27 02:27:32 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i175t-d3a25a158308834c3a290b8e6262c7d76247ae2568af52e8a45a75247aaf463e3 |
PageCount | 4 |
ParticipantIDs | ieee_primary_5453605 |
PublicationCentury | 2000 |
PublicationDate | 2010-April |
PublicationDateYYYYMMDD | 2010-04-01 |
PublicationDate_xml | – month: 04 year: 2010 text: 2010-April |
PublicationDecade | 2010 |
PublicationTitle | 2010 Third International Symposium on Intelligent Information Technology and Security Informatics |
PublicationTitleAbbrev | IITSI |
PublicationYear | 2010 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssj0000451873 |
Score | 1.4739206 |
Snippet | It's very important to find an efficient method of secret key management to guarantee secure communication in wireless sensor networks. In this paper, a... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 507 |
SubjectTerms | Computer network management Computer science Computer security Electronic mail Energy consumption Energy management Information security key establishment key management scheme Space technology Technology management Wireless sensor networks |
Title | A High Security Dynamic Secret Key Management Scheme for Wireless Sensor Networks |
URI | https://ieeexplore.ieee.org/document/5453605 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFG-QkydUMH6nB48Wxtpu3dGoBDQQDZBwI133Go1mEBgH_et93QcY48Fb38uWNF33Ptrf-z1Crj3cJsqTikktLBMWLIslABMmUIGSJjGhqx0ejoL-VDzO5KxGbra1MACQg8-g7Yb5XX6yMBt3VNZBb88DR1i6h4lbUau1PU9xPCkq5FXtVoA7N6gonUqZ7zg2O4PBZDwokF0u9v3RWSV3LL0GGVZTKvAk7-1NFrfN1y-2xv_O-YC0diV89HnrnA5JDdIj0qh6ONDyl26Sl1vqoB50XPaxo_dFi3qnWEFGn-CT7iAy-N4rDihGutThZj_QTuKT6RrlUQEoX7fItPcwueuzss0Ce8PYIWMJ177UXak4WhwuDIqRFyvAVMc3YYLWUoQaMDRS2koflBZSh9IptRUBB35M6ukihRNChQ_gC2ljg4lj1xqtI-sqez0hIDJRckqaboXmy4JJY14uztnf6nOyX9zVO5zMBalnqw1cYgiQxVf5t_8Gluaskw |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDI6mcYDTgA3xJgeOdOuapE2PCJg29hBom7TblKaOQKAObd0Bfj1OHxtCHLjZUStFkWM7yffZhFy7aCbSFdIRihuHGzBOJAAcrn3pS6FjHVju8HDkd6f8cSZmFXKz4cIAQAY-g6YVs7f8eKHX9qqshdGe-bZg6Q5KPMzZWpsbFVspRQasZG_5aLt-WdSp0Nm2ymar15uMezm2y2a_P3qrZKGlUyPDclI5ouStuU6jpv76Va_xv7PeJ40tiY8-bcLTAalAckhqZRcHWmzqOnm-pRbsQcdFJzt6nzeptwNLSGkfPukWJIP_vaBAMdelFjn7jp4Sv0xWqI9ySPmqQaadh8ld1ykaLTivmD2kTsyUJ1RbSIY-h3GNauhGEvCw4-kgRn_JAwWYHEllhAdScaECYQeV4T4DdkSqySKBY0K5B-BxYSKNR8e20UqFxnJ7Xc4h1GF8Qup2heYfeS2NebE4p38PX5Hd7mQ4mA96o_4Z2ctf7i1q5pxU0-UaLjAhSKPLzA6-AdtXr-M |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2010+Third+International+Symposium+on+Intelligent+Information+Technology+and+Security+Informatics&rft.atitle=A+High+Security+Dynamic+Secret+Key+Management+Scheme+for+Wireless+Sensor+Networks&rft.au=Lanying+Li&rft.au=Xin+Wang&rft.date=2010-04-01&rft.pub=IEEE&rft.isbn=9781424467303&rft.spage=507&rft.epage=510&rft_id=info:doi/10.1109%2FIITSI.2010.46&rft.externalDocID=5453605 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424467303/lc.gif&client=summon&freeimage=true |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424467303/mc.gif&client=summon&freeimage=true |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424467303/sc.gif&client=summon&freeimage=true |