3 research outputs found

    Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue

    Get PDF
    Key management in wireless sensor network (WSN) includes two important aspects namely key distribution, which constitutes the task of distributing secret keys to nodes in the network, and key revocation, which refers to the task of securely withdrawing the key information relating to any compromised node or because of tactical reasons. While in the existing literature, key distribution has been extensively studied, key revocation has received relatively little attention. A vital security issue like this needs proper recognition to be considered as a critical research area, not just as a partial segment of key management. With this motivation, in this paper, we present our rationale behind recognising the area and analyse the state-of-the-art key revocation techniques. Alongside our survey on the prominent schemes, we also present an analysis of security and performance that highlights the advantages and disadvantages of each scheme that explicitly mentions the method of key revocation

    A Node Revocation Scheme Using Public-Key Cryptography in Wireless Sensor Networks

    No full text
    100學年度研究獎補助論文[[abstract]]Generally deployed in an unattended environment, a sensor network can be easily assaulted or compromised by adversaries. Network security becomes a major problem. A distributed node revocation scheme is effective in reducing the damages a compromised node may cause to a sensor network, but its operation tends to consume large-scale memory space of the hardware-constrained sensor nodes. To reduce such complexity, this paper presents a new distributed voting revocation scheme based on the one-way hash chain, the certificate revocation list and the public-key cryptography. Performance evaluation shows that our scheme outperforms the other target schemes in enhancing network security at reasonable calculation cost which is acceptable to the sensor nodes.[[notice]]補正完畢[[journaltype]]國內[[incitationindex]]SCI[[ispeerreviewed]]Y[[booktype]]紙本[[countrycodes]]TW

    A Node Revocation Scheme Using Public-Key Cryptography in Wireless Sensor Networks *

    No full text
    Generally deployed in an unattended environment, a sensor network can be easily assaulted or compromised by adversaries. Network security becomes a major problem. A distributed node revocation scheme is effective in reducing the damages a compromised node may cause to a sensor network, but its operation tends to consume large-scale memory space of the hardware-constrained sensor nodes. To reduce such complexity, this paper presents a new distributed voting revocation scheme based on the one-way hash chain, the certificate revocation list and the public-key cryptography. Performance evaluation shows that our scheme outperforms the other target schemes in enhancing network security at reasonable calculation cost which is acceptable to the sensor nodes
    corecore