Post-deployment Based Key Distribution Mechanism for Wireless Sensor Networks

Authors:Cao, Qiuhua, Department of Computer ScienceUniversity of Virginia Stankovic, John, Department of Computer ScienceUniversity of Virginia

sensor networks, sensor nodes have to obtain secret keys. Many key management schemes, such as KDC and asymmetric cryptography, are not suitable for wireless sensor networks due to the strict resource constraints. Most key pre-distribution algorithms require that each node stores a set of keys before the deployment and discovers the keys shared with the neighboring nodes after the deployment. In this paper we present an efficient key distribution algorithm based on the topology and the secure communication requirements of the system. Our algorithm assigns keys to each node after the deployment. Thus, each node needs to store sufficient number of keys only. By providing the mechanism to secure the key distribution process, our algorithm enables the system to recover from severe attacks by redistributing the keys. Based on the simulation results and the analytic study we demonstrate that our algorithm is efficient in memory, bandwidth, and energy. At the same time, our algorithm is able to provide 100% connectivity and stronger resilience to node capture.
Note: Abstract extracted from PDF text

All rights reserved (no additional license for public reuse)
Source Citation:

Cao, Qiuhua, and John Stankovic. "Post-deployment Based Key Distribution Mechanism for Wireless Sensor Networks." University of Virginia Dept. of Computer Science Tech Report (2008).

University of Virginia, Department of Computer Science
Published Date: