Authors: Abraham Jibi, K.S. Ramanatha
Addresses: Department of Computer Science and Engineering, M.S. Ramaiah Institute of Technology, MSRIT Post, Bangalore – 560 054, Karnataka, India. ' Department of Computer Science and Engineering, M.S. Ramaiah Institute of Technology, MSRIT Post, Bangalore – 560 054, Karnataka, India
Abstract: In this paper, we discuss a basic key management protocol to generate and distribute the keys required for a secure group communication system, which also preserves the backward and forward secrecies. We devise a few relaxed policies for rekeying and formulate an enhanced set of protocols for key management. All the communications in the protocols are properly authenticated using Elliptic Curve Digital Signature scheme. The relaxed protocols reduce the number of rekeying to almost 25%, thus saving energy. The security analysis shows that our protocols can withstand several possible security attacks especially the serious one, the node capture attack.
Keywords: wireless sensor networks; WSNs; wireless networks; base station; cluster head; secret keys; distributed key management; rekeying policies; group communication; security; node capture attack; energy efficiency.
International Journal of Ad Hoc and Ubiquitous Computing, 2009 Vol.4 No.1, pp.3 - 12
Published online: 09 Dec 2008 *Full-text access for editors Access for subscribers Purchase this article Comment on this article