z-logo
open-access-imgOpen Access
Architecture Aware Key Management Scheme for Wireless Sensor Networks
Author(s) -
Benamar Kadri,
Mohammed Feham,
Abdellah Mhammed
Publication year - 2012
Publication title -
international journal of information technology and computer science
Language(s) - English
Resource type - Journals
eISSN - 2074-9015
pISSN - 2074-9007
DOI - 10.5815/ijitcs.2012.12.05
Subject(s) - computer science , key (lock) , scheme (mathematics) , key management , computer network , architecture , wireless sensor network , wireless , computer architecture , distributed computing , telecommunications , computer security , encryption , art , mathematical analysis , mathematics , visual arts
The emergence of wireless networking as well as the development in embedded systems and technologies have given birth to application specific networks called wireless sensor networks WSNs, their flexibility, facility of use and deployment as well as their low cost give them an increasing field of applications. Usually sensors are limited in capacities deployed in a hostile and unpredictable environment, making the security of these networks a challenging task. In this paper we are going to present a key management scheme in which the base station play the role of the secure third party responsible of distributing key and managing security in the network, two versions of this scheme are presented the first one for flat networks and the second one for hierarchical networks in which the cluster head play the key role in all key agreement with the base station.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom