Next Article in Journal
Performance Comparison of a Novel Adaptive Protocol with the Fixed Power Transmission in Wireless Sensor Networks
Next Article in Special Issue
Critical Infrastructure Surveillance Using Secure Wireless Sensor Networks
Previous Article in Journal
Multi-Hop-Enabled Energy-Efficient MAC Protocol for Underwater Acoustic Sensor Networks
Open AccessArticle

Key Management in Wireless Sensor Networks

1
University Clermont Auvergne, 49 Boulevard François Mitterrand, BP 10448, F-63000 Clermont-Ferrand, France
2
CNRS, UMR 6158, Campus des Cézeaux, LIMOS, F-63173 Aubière, France
*
Author to whom correspondence should be addressed.
Academic Editor: Dharma P. Agrawal
J. Sens. Actuator Netw. 2015, 4(3), 251-273; https://doi.org/10.3390/jsan4030251
Received: 17 April 2015 / Accepted: 14 August 2015 / Published: 7 September 2015
(This article belongs to the Special Issue Security Issues in Sensor Networks)
Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances. View Full-Text
Keywords: renewing; revocation; authentication; wireless sensor network; security; multihop; verification; formal proof renewing; revocation; authentication; wireless sensor network; security; multihop; verification; formal proof
Show Figures

Figure 1

MDPI and ACS Style

Mansour, I.; Chalhoub, G.; Lafourcade, P. Key Management in Wireless Sensor Networks. J. Sens. Actuator Netw. 2015, 4, 251-273. https://doi.org/10.3390/jsan4030251

AMA Style

Mansour I, Chalhoub G, Lafourcade P. Key Management in Wireless Sensor Networks. Journal of Sensor and Actuator Networks. 2015; 4(3):251-273. https://doi.org/10.3390/jsan4030251

Chicago/Turabian Style

Mansour, Ismail; Chalhoub, Gérard; Lafourcade, Pascal. 2015. "Key Management in Wireless Sensor Networks" J. Sens. Actuator Netw. 4, no. 3: 251-273. https://doi.org/10.3390/jsan4030251

Find Other Styles

Article Access Map by Country/Region

1
Only visits after 24 November 2015 are recorded.
Search more from Scilit
 
Search
Back to TopTop