Framework design and performance analysis on pairwise key establishment

Younho Lee, Yongsu Park

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Pairwise key establishment provides an effective way to build secure communication links among sensor nodes using cryptographic techniques. Up till now, researchers have devised numerous schemes that employ diverse cryptographic or combinatoric methods in order to provide high security, high connectivity and low storage overheads on the sensors. In this paper, we present a new framework on pairwise key establishment. We show that it can encompass most of the major previous schemes. Furthermore, we analyze the performance of the previous schemes using the proposed framework. When 100% connectivity is provided, under the same storage overhead on the sensor nodes, Blundo scheme and Blum scheme provide the highest security against intelligent adversaries while YG-L scheme is the best against random adversaries. When connectivity is under 100%, for random adversaries, location-aware schemes provide better security than non-location based schemes whereas for intelligent adversaries, all location based schemes' security is less than that of other schemes.

Original languageEnglish
Title of host publicationManagement Enabling the Future Internet for Changing Business and New Computing Services - 12th Asia-Pacific Network Operations and Management Symposium, APNOMS 2009, Proceedings
Pages311-320
Number of pages10
DOIs
StatePublished - 2009
Event12th Asia-Pacific Network Operations and Management Symposium, APNOMS 2009 - Jeju, Korea, Republic of
Duration: 23 Sep 200925 Sep 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5787 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference12th Asia-Pacific Network Operations and Management Symposium, APNOMS 2009
Country/TerritoryKorea, Republic of
CityJeju
Period23/09/0925/09/09

Keywords

  • Network security
  • Secure communications
  • Wireless sensor networks

Fingerprint

Dive into the research topics of 'Framework design and performance analysis on pairwise key establishment'. Together they form a unique fingerprint.

Cite this