Taha Yasin Rezapour, M. S. Abolghasemi, Reza Ebrahimi Atani
{"title":"A position-based key management scheme for heterogeneous sensor networks","authors":"Taha Yasin Rezapour, M. S. Abolghasemi, Reza Ebrahimi Atani","doi":"10.1109/ISCISC.2013.6767350","DOIUrl":null,"url":null,"abstract":"Wireless sensor networks have many applications in the areas of commercial, military and environmental requirements. These networks face a lot of security challenges for reasons such as insecure communications and wireless communications. How to manage the cryptographic keys between sensor nodes deployed in the network in order to make maximum security with minimum cost as a basic approach in securing these networks has attracted attention of researchers. Therefore, in this paper by using the position of the sensor nodes as part of their identity, a novel method for key management in heterogeneous sensor networks have been proposed.","PeriodicalId":265985,"journal":{"name":"2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 10th International ISC Conference on Information Security and Cryptology (ISCISC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCISC.2013.6767350","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Wireless sensor networks have many applications in the areas of commercial, military and environmental requirements. These networks face a lot of security challenges for reasons such as insecure communications and wireless communications. How to manage the cryptographic keys between sensor nodes deployed in the network in order to make maximum security with minimum cost as a basic approach in securing these networks has attracted attention of researchers. Therefore, in this paper by using the position of the sensor nodes as part of their identity, a novel method for key management in heterogeneous sensor networks have been proposed.