A Routing-Driven Public-Key Cryptosystem Based Key Management Scheme for a Sensor Network
| ||International Journal of Computer Trends and Technology (IJCTT)|| |
|© - Sep to Oct Issue 2011 by IJCTT Journal|
|Volume-1 Issue-2 |
|Year of Publication : 2011|
|Authors : Satya Venkatesh Kadali, O.Srinivasa Rao, Dr MHM Krishna Prasad.|
Satya Venkatesh Kadali, O.Srinivasa Rao, Dr MHM Krishna Prasad. "A Routing-Driven Public-Key Cryptosystem Based Key Management Scheme for a Sensor Network"International Journal of Computer Trends and Technology (IJCTT),V2(2):254-257 - Sep to Oct Issue 2011 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract: In homogeneous sensor networks, many-to-one traffic pattern dominates and hence a sensor may only communicate with a small portion of its neighbors. So, the homogeneous sensor networks have poor performance and scalability. Most existing key management schemes try to establish shared keys for all pairs of neighbor sensors, no matter whether these will communicate with each other or not, and this causes large overhead. This project proposes a novel routing-driven key management scheme, which establishes shared keys only for those neighboring sensors that communicate with each other by using RSA public-key algorithm along with Quantum Key Distribution Protocols (QKDPs). Quantum cryptography easily resists replay and passive attacks. Classical cryptography enables efficient key verification and user authentication. This work integrates the advantages of these two techniques along with QKDPs so that the eavesdroppers can be detected, replay attacks can be easily avoided. This project also proposes how user authentication and session key verification can be done in a single step process at the receiving end. .
 L. Eschenauer and V. D. Gligor, “A key management scheme for distributed sensor networks,” in Proc. 9th ACM Conference on Computerand Communication Security, pp. 41-47, Nov. 2002.
 H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” in Proc. 2003 IEEE Symposium on Security and Privacy, May 2003, pp. 197-213.
 Yong Ma, Siddharth Dala1, Majd Alwan, James Aylor, “ROP: A Resource Oriented Protocol for Heterogeneous Sensor Networks” Wireless Communications, vol. 6, no. 9, pp. 3395–3401, in 2007.
 K. Whitehouse, C. Sharp, E. Brewer, and D. Culler, “Hood: a neighborhood abstraction for sensor networks,” in Proc. ACM International Conference on Mobile Systems, Applications, and Services (MobiSys ’04), Boston, MA, June, 2004.
 N. Koblitz, “Elliptic curve cryptosystems,” Mathematics of omputation, vol. 48, pp. 203-209, 1987.
 N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, “Comparing elliptic curve cryptography and RSA on 8-bit CPUs,” in Proc. 6th International Workshop on Cryptographic Hardware and Embedded Systems, Boston, MA, Aug. 2004.
 N. Koblitz, A Course in Number Theory and Cryptography, 2nd ed. Graduate Texts in Mathematics, vol. 114, Springer, 1994.
 I. Blake, G. Seroussi, and N. Smart, Elliptic Curves in Cryptography, London Mathematical Society, Lecture Note Series 265, Cambridge University Press, 1999.
KeywordsSecurity, key management, sensor networks, Quantum Key Distribution Protocols (QKDPs).