Abstract
WSAN (Wireless Sensor and Actor Network) has become a promising direction in research. However, up to now, little work has been done in WSAN, especially in security issues. In this paper, we first discuss several challenges in security of WSAN. Aiming at these challenges, we propose our key establishment scheme for heterogeneous nodes in WSAN. In our scheme, authentication and key establishment can be finished with just one round-trip communication. Further more, our scheme is especially designed for heterogeneous architectures. Capability of resource-rich actors are fully used. Finally, our scheme and existing schemes for Ad Hoc Networks and WSN (Wireless Sensor Network) are compared and analyzed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Akyildiz, I.F., Kasimoglu, I.H.: Wireless sensor and actor networks: research challenges. Ad hoc networks 2 (2004) (2004)
Hu, F., Cao, X.: Security in Wireless Actor & Sensor Networks (WASN): Towards A Hierarchical Re-Keying Design. ITCC (2) (2005)
Akyildiz, I.F., Pompili, D., Melodia, T.: Underwater Acoustic Sensor Networks: Research Challenges. Elsevier’s Journal of Ad Hoc Networks 3(3), 257–279 (2005)
Durresi, A., Durresi, M., Barolli, L.: Sensor Inter-vehicle Communication for Safer Highways. In: Proc. of the First International Workshop on Ubiquitous Smart Worlds, USW 2005 (2005)
Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119–132. Springer, Heidelberg (2004)
Watro, R., Kong, D., Fen Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: TinyPK: Securing Sensor Networks with Public Key Technology. In: Proc. of ACM SASN (2004)
Du, W., Wang, R., Ning, P.: An Efficient Scheme for Authenticating Public Keys in Sensor Networks. In: Proc. of The 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc (2005)
Eschenauer, L., Gligor, V.: A Key-Management Scheme for Distributed Sensor Networks. In: Proc. of ACM CCS (2002)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor net-works. In: Proc. of Symposium on Security and Privacy (2003)
Huang, D., Mehta, M., Medhi, D., Harn, L.: Location-aware Key Management Scheme for Wireless Sensor Networks. In: Proc. of ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN 2004 (2004)
Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In: Proc. of IEEE Infocom 2004 (2004)
Zhou, L., Haas, Z.J.: Securing Adhoc Networks. IEEE Network Magazine 13(6), 24–30 (1999)
Capkun, S., Buttyan, L., Hubaux, J.P.: Self-Organized PublicKey Management for Mobile Ad Hoc Networks. IEEE Trans. Mobile Computing 2(1), 52–64 (2003)
Bechler, M., Hof, H.-J., Kraft, D., Pahlke, F., Wolf, L.: A Cluster-Based Security Architecture for Ad Hoc Networks. In: Proc. of IEEE Infocom 2004 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yu, B., Ma, J., Wang, Z., Mao, D., Gao, C. (2006). Key Establishment Between Heterogenous Nodes in Wireless Sensor and Actor Networks. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds) Advanced Web and Network Technologies, and Applications. APWeb 2006. Lecture Notes in Computer Science, vol 3842. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11610496_25
Download citation
DOI: https://doi.org/10.1007/11610496_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-31158-4
Online ISBN: 978-3-540-32435-5
eBook Packages: Computer ScienceComputer Science (R0)