Change search
ReferencesLink to record
Permanent link

Direct link
Suggesting a method to improve encryption key management in wireless sensor networks
KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
KTH, School of Information and Communication Technology (ICT), Computer and Systems Sciences, DSV.
2015 (English)In: Indian Journal of Science and Technology, ISSN 0974-6846, E-ISSN 0974-5645, Vol. 8, no 19, 75986Article in journal (Refereed) Published
Abstract [en]

Background/Objectives: Recent technology achievements in electronics and wireless communication makes it possible to provide sensor nodes in low cost, low power, small size, and ability to communicate with other nodes in vicinity, which results in design of wireless sensor networks. Nowadays there are many different applications for wireless sensor networks such as in medicine, military, business, etc. Methods/Statistical Analysis: Considering the structure of such networks that is based on wireless communication, also the variety of usage in different critical domains such as military domain, information and communication security is one of the major aspects that must be exactly considered to design and implement wireless sensor networks. Proposing a method to provide security in wireless sensor networks is depended on structure and properties of each node, thus it is more difficult and more complex than in other types of networks. Findings: Considering the vulnerability of this type of networks against different attacks, finding out a low cost method to guarantee a reasonable level of security in wireless sensor networks has become an issue of interest these days. There are several methods to provide security in such environments. One of them is data encryption using encryption keys. When it comes to wireless sensor networks, the issue of key management is different because of the different structure of these networks. In other words, considering mobility of nodes, structure of wireless communication and message broadcasting, limited energy resources, variety of application domains, and widespread nodes, providing security in such networks is totally different from other similar environments. Application/Improvements: A lot of research has been done in this area and different methods have been proposed. However there still are lots of aspects in this area that need to be studied more. In this study we are going to find a new expansive method to distribute the encryption keys in wireless sensor networks based on some of special properties of such network.

Place, publisher, year, edition, pages
Indian Society for Education and Environment , 2015. Vol. 8, no 19, 75986
Keyword [en]
Encryption key management, Network security, Wireless sensor networks
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
URN: urn:nbn:se:kth:diva-175103DOI: 10.17485/ijst/2015/v8i19/75986ScopusID: 2-s2.0-84941112022OAI: oai:DiVA.org:kth-175103DiVA: diva2:882158
Note

QC 20151214

Available from: 2015-12-14 Created: 2015-10-09 Last updated: 2015-12-14Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full textScopus

Search in DiVA

By author/editor
Toghian, MehrnoushCiobanu-Morogan, Matei
By organisation
Computer and Systems Sciences, DSV
In the same journal
Indian Journal of Science and Technology
Electrical Engineering, Electronic Engineering, Information Engineering

Search outside of DiVA

GoogleGoogle Scholar
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Altmetric score

Total: 8 hits
ReferencesLink to record
Permanent link

Direct link