ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Conference Paper Consideration of Efficient Nearest Node Discovering Mechanisms for Key Infection
Cited 0 time in scopus Download 0 time Share share facebook twitter linkedin kakaostory
Authors
Jin Bum Hwang, Young Sik Hwang, Jong Wook Han
Issue Date
2006-02
Citation
International Conference on Advanced Communication Technology (ICACT) 2006, pp.1686-1689
Language
English
Type
Conference Paper
Project Code
06MK2600, The Development of SecurityTechnology based on Device Authentication for Ubiquitous Home Network, Han Jong-Wook
Abstract
Given the growing number of applications of wireless sensor networks, security has been focused on as an important issue. One of the important security issues in sensor networks is key agreement scheme. Several schemes have been proposed, but none of them satisfy the sensor network requirement absolutely due to the serious constrains of the sensor network. Key Infection [1] intends to solve this problem by introducing a new paradigm in key agreement scheme on sensor networks, which assumes a realistic attacker model. In the Key Infection model, it is important to discover nearest sensor node at the key agreement time for secrecy improving. In this paper, we suggest several mechanisms to discover nearest sensor node, which is named "Key Whispering" in the Key Infection model, and compare them with each other in terms of energy efficiency and secrecy.
KSP Keywords
Energy Efficiency, Infection model, Security issues, Sensor node, Static wireless sensor networks(WSNs), attacker model, key agreement, key infection