Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2015, Article ID 627548, 10 pages
http://dx.doi.org/10.1155/2015/627548
Research Article

Enhanced Key Management Protocols for Wireless Sensor Networks

1School of Computer, Beijing University of Posts and Telecommunications, Beijing 100876, China
2State Grid Metering Center, Beijing 100192, China
3Department of Electronic Systems Engineering, Hanyang University, Ansan 426791, Republic of Korea

Received 29 August 2014; Accepted 1 September 2014

Academic Editor: David Taniar

Copyright © 2015 Baojiang Cui et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: a survey,” Computer Networks, vol. 38, no. 4, pp. 393–422, 2002. View at Publisher · View at Google Scholar · View at Scopus
  2. X. He, M. Niedermeier, and H. de Meer, “Dynamic key management in wireless sensor networks: a survey,” Journal of Network and Computer Applications, vol. 36, no. 2, pp. 611–622, 2013. View at Publisher · View at Google Scholar · View at Scopus
  3. R. Riaz, A. Naureen, A. Akram, A. H. Akbar, K. H. Kim, and H. Farooq Ahmed, “A unified security framework with three key management schemes for wireless sensor networks,” Computer Communications, vol. 31, no. 18, pp. 4269–4280, 2008. View at Publisher · View at Google Scholar · View at Scopus
  4. C. Intanaonwiwat, R. Govindan, and D. Estrin, “Directed diffusion: a scalable and robust communication paradigm for sensor networks,” in Proceedings of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom '00), pp. 56–67, ACM/IEEE, Boston, Mass, USA, August 2000. View at Publisher · View at Google Scholar
  5. A. Manjeshwar and D. P. Agrawal, “TEEN: a routing protocol for enhanced efficiency in wireless sensor networks,” in Proceedings of the 15th International Parallel and Distributed Processing Symposium (IPDPS '01), pp. 2009–2015, IEEE Computer Society, San Francisco, Calif, USA, April 2001. View at Publisher · View at Google Scholar
  6. A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, “SPINS: security protocols for sensor networks,” in Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (Mobicom '01), pp. 189–199, Rome, Italy, July 2001. View at Scopus
  7. W. Du, J. Deng, Y. S. Han, and P. K. Varshney, “A pairwise key pre-distribution scheme for wireless sensor networks,” in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pp. 42–51, ACM Press, Washington, DC, USA, October 2003. View at Scopus
  8. H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” in Proceedings of the IEEE Symposium on Security and Privacy, pp. 197–213, Oakland, Calif, USA, May 2003. View at Publisher · View at Google Scholar
  9. H. O. Sanli, S. Ozdemir, and H. Cam, “SRDA: secure reference-based data aggregation protocol for wireless sensor networks,” in Proceedings of the IEEE 60th Vehicular Technology Conference (VTC '04), pp. 406–410, IEEE, Los Angeles, Calif, USA, 2004.
  10. T. Dimitriou and I. Krontiris, “A localized, distributed protocol for secure information exchange in sensor networks,” in Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS '05), pp. 37–45, IEEE, April 2005. View at Publisher · View at Google Scholar · View at Scopus
  11. S. Zhu, S. Setia, and S. Jajodia, “LEAP: efficient security mechanisms for large-scale distributed sensor networks,” in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pp. 62–72, ACM, New York, NY, USA, October 2003. View at Scopus
  12. J. Shen and L. Xu, “Cluster-based key pre-distribution seheme for wireless sensor networks,” Journal of Wuhan University: Natural Science Edition, vol. 55, no. 1, pp. 117–120, 2009 (Chinese). View at Google Scholar
  13. X. Huang, M. Yang, and S.-S. Lv, “Secure and efficient key management protocol for wireless sensor network and simulation,” Journal of System Simulation, vol. 20, no. 7, pp. 1898–1903, 2008. View at Google Scholar
  14. X. Chen, J. Li, J. Ma, Q. Tang, and W. Lou, “New algorithms for secure outsourcing of modular exponentiations,” in Computer Security—ESORICS 2012: 17th European Symposium on Research in Computer Security (ESORICS '12), Pisa, Italy, September 10–12, 2012, vol. 7459 of Lecture Notes in Computer Science, pp. 541–556, Springer, Berlin, Germany, 2012. View at Publisher · View at Google Scholar
  15. L.-C. Li, J.-H. Li, and J. Pan, “Self-healing group key management scheme with revocation capability for wireless sensor networks,” Journal on Communications, vol. 30, no. 12, pp. 12–17, 2009. View at Google Scholar · View at Scopus
  16. Z. Ming, W. Suo-ping, and X. He, “Dynamic key management scheme for wireless sensor networks based on cluster,” Journal of Nanjing University of Posts and Telecommunications (Natural Science), vol. 32, no. 1, 2012. View at Google Scholar
  17. G.-J. Wang, T.-T. Lv, and M.-Y. Guo, “Transitory initial key-based key management protocol in wireless sensor networks,” Chinese Journal of Sensors and Actuators, vol. 20, no. 7, pp. 1581–1586, 2007. View at Google Scholar · View at Scopus
  18. Y.-F. Ciou, F.-Y. Leu, Y.-L. Huang, and K. Yim, “A handover security mechanism employing the Diffie-Hellman key exchange approach for the IEEE802.16e wireless networks,” Mobile Information Systems, vol. 7, no. 3, pp. 241–269, 2011. View at Publisher · View at Google Scholar · View at Scopus
  19. J. Li, X. Chen, J. Li, C. Jia, J. Ma, and W. Lou, “Fine-grained access control system based on outsourced attribute-based encryption,” in Computer Security—ESORICS 2013: 18th European Symposium on Research in Computer Security, Egham, UK, September 9–13, 2013. Proceedings, vol. 8134 of Lecture Notes in Computer Science, pp. 592–609, Springer, Berlin, Germany, 2013. View at Publisher · View at Google Scholar
  20. A. Zhu, S. Xu, S. Setia, and S. Jajodia, “Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach,” in Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP '03), pp. 326–335, Atlanta, Ga, USA, November 2003. View at Publisher · View at Google Scholar
  21. W. Du, Y. S. Han, J. Deng, and P. K. Varshney, “A pairwise key pre-distribution scheme for wireless sensor networks,” in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pp. 42–51, Washington, DC, USA, October 2003. View at Scopus
  22. D. Liu and P. Ning, “Multi-level μTESLA: broadcast authentication for distributed sensor networks,” ACM Transactions on Embedded Computing Systems, vol. 3, no. 4, pp. 800–836, 2004. View at Google Scholar
  23. J. Li, Q. Wang, C. Wang, and K. Ren, “Enhancing attribute-based encryption with attribute hierarchy,” Mobile Networks and Applications, vol. 16, no. 5, pp. 553–561, 2011. View at Publisher · View at Google Scholar · View at Scopus
  24. Y. S. Lee, J. W. Park, and L. Barolli, “A localization algorithm based on AOA for ad-hoc sensor networks,” Mobile Information Systems, vol. 8, no. 1, pp. 61–72, 2012. View at Publisher · View at Google Scholar · View at Scopus