A Dynamic authentication scheme for hierarchical wireless sensor networks

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

8 Citations (Scopus)

Abstract

Sensor networks offer economically viable solutions for a wide variety of monitoring applications. In surveillance of critical infrastructure such as airports by sensor networks, security becomes a major concern. To resist against malicious attacks, secure communication between severely resource-constrained sensor nodes is necessary while maintaining scalability and flexibility to topology changes. A robust security solution for such networks must facilitate authentication of sensor nodes and the establishment of secret keys among nodes In this paper, we propose a decentralized authentication and key management framework for hierarchical ad hoc sensor networks. This scheme is light weight and energy aware and reduces the communication overhead.

Original languageEnglish
Title of host publicationMobile and Ubiquitous Systems: Computing, Networking, and Services - 7th International ICST Conference, MobiQuitous 2010, Revised Selected Papers
Subtitle of host publicationProceedings of the 7th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services
EditorsPatrick Sénac, Max Ott, Aruna Seneviratne
Place of PublicationHeidelberg
PublisherSpringer, Springer Nature
Pages186-197
Number of pages12
Volume73
ISBN (Electronic)9783642291548
ISBN (Print)9783642291531
DOIs
Publication statusPublished - 2010
EventInternational ICST Conference on Mobile and Ubiquitous Systems : Computing, Networking and Services (7th : 2010) - Sydney
Duration: 6 Dec 20109 Dec 2010

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
Volume73 LNICST
ISSN (Print)18678211

Conference

ConferenceInternational ICST Conference on Mobile and Ubiquitous Systems : Computing, Networking and Services (7th : 2010)
CitySydney
Period6/12/109/12/10

Keywords

  • Authentication
  • Wireless Sensor Networks

Fingerprint

Dive into the research topics of 'A Dynamic authentication scheme for hierarchical wireless sensor networks'. Together they form a unique fingerprint.

Cite this