International Conference and Workshop on Emerging Trends in Technology |
Foundation of Computer Science USA |
ICWET - Number 7 |
None 2011 |
Authors: Hemanta Kumar Kalita, Avijit Kar |
bb51e2dd-60bf-488d-9a53-2b4a1ff9747f |
Hemanta Kumar Kalita, Avijit Kar . Key Management and Security Planning in Wireless Ad-Hoc Networks. International Conference and Workshop on Emerging Trends in Technology. ICWET, 7 (None 2011), 12-19.
Wireless Sensor Network is a class of wireless ad hoc networks. Self organization is an important phase of a wireless sensor network. After deployment, sensors nodes are required to self organize themselves to form a network of their own. Security is an important aspect while forming the network. Only the authorized nodes should be allowed to join the network. For implementing security, such as confidentiality, integrity and authentication, keys are needed. How keys are handled is described in key management approach. Key management encompasses generation, storage, distribution, re-key and retirement of a key. It is observed that majority of the attacks are carried out during the key distribution phase itself. Hence, a proper key management is utmost important for implementing fool proof security in a Wireless Sensor Network. Depending upon the type of keys used, for example, symmetric or asymmetric key, key management techniques vary. In this paper an approach to key management for asymmetric key based security schemes of Wireless Sensor Network is proposed. The approach considers entire life of a ‘key’ and subsequently proposes algorithms/schemes for key (pre) distribution, re-key and revocation. We also discuss security planning steps for wireless sensor network in this paper.