Simple non-interactive pairwise key establishment scheme in sensor networks

Chia Mu Yu, Chun Shien Lu, Sy Yen Kuo

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

11 Scopus citations

Abstract

In this paper, a ConstrAined Random Perturbation based pairwise keY establishment (CARPY) scheme and its variant, a CARPY+ scheme, for Wireless Sensor Networks (WSNs), are presented. Compared to all existing schemes which satisfy only some requirements in so-called sensor-key criteria, including 1) resilience to the adversary's intervention, 2) directed and guaranteed key establishment, 3) resilience to network configurations, 4) efficiency, and 5) resilience to dynamic node deployment, the proposed CARPY+ scheme meets all requirements. In particular, to the best of our knowledge, CARPY+ is the first non-interactive key establishment scheme with great resilience to a large number of node compromises designed for WSNs. We examine the CARPY and CARPY+ schemes from both the theoretical and experimental aspects. Our schemes have also been practically implemented on the TelosB compatible mote to evaluate the corresponding performance and overhead.

Original languageEnglish
Title of host publication2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2009
DOIs
StatePublished - 2009
Externally publishedYes
Event6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2009 - Rome, Italy
Duration: 22 06 200926 06 2009

Publication series

Name2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2009

Conference

Conference6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2009
Country/TerritoryItaly
CityRome
Period22/06/0926/06/09

Fingerprint

Dive into the research topics of 'Simple non-interactive pairwise key establishment scheme in sensor networks'. Together they form a unique fingerprint.

Cite this