Key handling in wireless sensor networks

Yue Li, Thomas Newe

Research output: Contribution to journalArticlepeer-review

Abstract

With the rapid growth of Wireless Sensor Networks (WSNs), many advanced application areas have received significant attention. However, security will be an important factor for their full adoption. Wireless sensor nodes pose unique challenges and as such traditional security protocols, used in traditional networks cannot be applied directly. Some new protocols have been published recently with the goal of providing both privacy of data and authentication of sensor nodes for WSNs. Such protocols can employ private-key and/or public key cryptographic algorithms. Public key algorithms hold the promise of simplifying the network infrastructure required to provide security services such as: privacy, authentication and non-repudiation, while symmetric algorithms require less processing power on the lower power wireless node. In this paper a selection of key establishment/agreement protocols are reviewed and they are broadly divided into two categories: group key agreement protocols and pair-wise key establishment protocols. A summary of the capabilities and security related services provided by each protocol is provided.

Original languageEnglish
Article number012060
JournalJournal of Physics: Conference Series
Volume76
Issue number1
DOIs
Publication statusPublished - 1 Sep 2007

Fingerprint

Dive into the research topics of 'Key handling in wireless sensor networks'. Together they form a unique fingerprint.

Cite this