Next Article in Journal
Performance Comparison of a Novel Adaptive Protocol with the Fixed Power Transmission in Wireless Sensor Networks
Next Article in Special Issue
Critical Infrastructure Surveillance Using SecureWireless Sensor Networks
Previous Article in Journal
Multi-Hop-Enabled Energy-Efficient MAC Protocol for Underwater Acoustic Sensor Networks
Article Menu

Export Article

Open AccessArticle
J. Sens. Actuator Netw. 2015, 4(3), 251-273; doi:10.3390/jsan4030251

Key Management in Wireless Sensor Networks

1
University Clermont Auvergne, 49 Boulevard François Mitterrand, BP 10448, F-63000 Clermont-Ferrand, France
2
CNRS, UMR 6158, Campus des Cézeaux, LIMOS, F-63173 Aubière, France
*
Author to whom correspondence should be addressed.
Academic Editor: Dharma P. Agrawal
Received: 17 April 2015 / Accepted: 14 August 2015 / Published: 7 September 2015
(This article belongs to the Special Issue Security Issues in Sensor Networks)
View Full-Text   |   Download PDF [226 KB, uploaded 7 September 2015]   |  

Abstract

Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances. View Full-Text
Keywords: renewing; revocation; authentication; wireless sensor network; security; multihop; verification; formal proof renewing; revocation; authentication; wireless sensor network; security; multihop; verification; formal proof
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).

Scifeed alert for new publications

Never miss any articles matching your research from any publisher
  • Get alerts for new papers matching your research
  • Find out the new papers from selected authors
  • Updated daily for 49'000+ journals and 6000+ publishers
  • Define your Scifeed now

SciFeed Share & Cite This Article

MDPI and ACS Style

Mansour, I.; Chalhoub, G.; Lafourcade, P. Key Management in Wireless Sensor Networks. J. Sens. Actuator Netw. 2015, 4, 251-273.

Show more citation formats Show less citations formats

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
J. Sens. Actuator Netw. EISSN 2224-2708 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top