Providing secrecy in key management protocols for large wireless sensors networks

Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia

Research output: Contribution to journalArticlepeer-review

56 Scopus citations

Abstract

This paper defines a new protocol KeEs for the key establishment that meets the security requirements of the threat model proposed. The KeEs protocol assures forward and backward secrecy of the session key, so that if any set of the session keys is compromised, even including the current session key, these compromised keys do not undermine neither the security of future session keys, nor the security of past session keys. We illustrate the protocol in two different scenarios, one in which a Base Station acts as a synchronizer for re-keying the sensors, and a second scenario based on a completely distributed approach where the sensors rely only on themselves to achieve synchronization in the re-keying process. For both scenarios the KeEs protocol requires minimal overhead in terms of computations and transmissions. Finally, in KeES none of the resources needed by a generic sensor is bounded to the size of the WSN. © 2003 Elsevier B.V. All rights reserved.
Original languageEnglish (US)
Pages (from-to)455-468
Number of pages14
JournalAd Hoc Networks
Volume1
Issue number4
DOIs
StatePublished - Jan 1 2003
Externally publishedYes

ASJC Scopus subject areas

  • Hardware and Architecture
  • Software
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Providing secrecy in key management protocols for large wireless sensors networks'. Together they form a unique fingerprint.

Cite this