SenseKey - Simplifying the selection of key management schemes for sensor networks

Rodrigo Roman, Javier Lopez, Cristina Alcaraz, Hsiao-Hwa Chen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

Key Management Schemes (KMS) are a very important security mechanism for Wireless Sensor Networks (WSN), as they are used to manage the credentials (i.e. secret keys) that are needed by the security primitives. There is a large number of available KMS protocols in the literature, but it is not clear what should network designers do to choose the most suitable protocol for the needs of their applications. In this paper, we consider that given a certain set of application requirements, the network designer can check which properties comply with those requirements and select the KMS protocols that contains those particular properties. Therefore, we study the relationship between requirements and properties, and we provide a web tool, the Sense Key tool, that can be used to automatically obtain an optimal set of KMS protocols.

Original languageEnglish
Title of host publicationProceedings - 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2011
Pages789-794
Number of pages6
DOIs
Publication statusPublished - 2011 May 31
Event25th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2011 - Biopolis, Singapore
Duration: 2011 Mar 222011 Mar 25

Publication series

NameProceedings - 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2011

Other

Other25th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2011
CountrySingapore
CityBiopolis
Period11-03-2211-03-25

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint Dive into the research topics of 'SenseKey - Simplifying the selection of key management schemes for sensor networks'. Together they form a unique fingerprint.

Cite this