The effects of probabilistic key management on secure routing in sensor networks

Patrick Traynor, Guohong Cao, Tom La Porta

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Scopus citations

Abstract

Secure data dissemination in wireless ad hoc and sensor networks has recently received a great deal of attention. A variety of protocols have been proposed in order to ensure secure data delivery across these systems; however, the majority, of these schemes assume the presence of public or pre-established symmetric keys. Accordingly, the cost of key management has not been incorporated into secure routing mechanisms in this setting. This paper considers the expenses incurred by sensor networks implementing secure routing schemes on top of probabilistic symmetric key management schemes. Specifically, we examine the overhead observed from proactive and reactive key establishment mechanisms for networks using a balanced method of key management. Through extensive simulation, we quantify more realistic costs for the application of secure hop-by-hop routing in sensor networks.

Original languageEnglish (US)
Title of host publication2006 IEEE Wireless Communications and Networking Conference, WCNC 2006
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages659-664
Number of pages6
ISBN (Print)1424402700, 9781424402700
DOIs
StatePublished - 2006
Event2006 IEEE Wireless Communications and Networking Conference, WCNC 2006 - Las Vegas, NV, United States
Duration: Apr 3 2006Apr 6 2006

Publication series

NameIEEE Wireless Communications and Networking Conference, WCNC
Volume2
ISSN (Print)1525-3511

Other

Other2006 IEEE Wireless Communications and Networking Conference, WCNC 2006
Country/TerritoryUnited States
CityLas Vegas, NV
Period4/3/064/6/06

All Science Journal Classification (ASJC) codes

  • General Engineering

Fingerprint

Dive into the research topics of 'The effects of probabilistic key management on secure routing in sensor networks'. Together they form a unique fingerprint.

Cite this