Next Article in Journal
A Sensor Array Realized by a Single Flexible TiO2/POMs Film to Contactless Detection of Triacetone Triperoxide
Previous Article in Journal
FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher
Article Menu
Issue 4 (February-2) cover image

Export Article

Open AccessArticle
Sensors 2019, 19(4), 914; https://doi.org/10.3390/s19040914

Evaluating Dynamic Approaches to Key (Re-)Establishment in Wireless Sensor Networks

1
Centre for Research on Cryptography and Security, Faculty of Informatics, Masaryk University, Brno 60200, Czech Republic
2
Institut National des Sciences Appliquées Centre Val de Loire, 18000 Bourges, France
*
Author to whom correspondence should be addressed.
Received: 10 December 2018 / Revised: 4 February 2019 / Accepted: 8 February 2019 / Published: 21 February 2019
(This article belongs to the Section Sensor Networks)
  |  
PDF [2939 KB, uploaded 21 February 2019]
  |  

Abstract

Wireless sensor networks with a large number of cheap low-power interconnected devices bring up challenging tasks when considering the security of their communications. In our previous work, we presented two approaches for the design of dynamic protocols for link key (re-)establishment in ad hoc networks, using two elements studied earlier—secrecy amplification and key extraction from radio channel fading. The goal of this article is to provide a unified approach to the design of these protocols, together with their experimental verification, in a real network with various settings. The overall results of our experiments show that our dynamic combination of secrecy amplification and key extraction from radio channel fading saves a significant portion of messages with corresponding energy expenditure and can adapt to a much wider scale of environments when compared to previous solutions based on the exploitation of the individual elements of secrecy amplification and key extraction from radio channel fading. View Full-Text
Keywords: adaptive; autonomous; cryptography; distributed; protocol; security; wireless radio communication adaptive; autonomous; cryptography; distributed; protocol; security; wireless radio communication
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Nemec, L.; Matyas, V.; Ostadal, R.; Svenda, P.; Palant, P.-L. Evaluating Dynamic Approaches to Key (Re-)Establishment in Wireless Sensor Networks. Sensors 2019, 19, 914.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top