Secret key revocation in sensor networks

Young Jae Maeng, Abedelaziz Mohaisen, Dae Hun Nyang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

Many challenging security-related issues have been studied in wireless sensor networks to provide a demanded quality and security for deliverable data. Yet, one of these issues which are not handled is the secret key revocation. In a semi-dynamic, resource-constrained and long-living sensor network with self organization features, traditional revocation methods are not desirable and somehow impractical. Through this paper, we discuss the rising issue of key revocation due to the predistribution and provide several techniques, structures and algorithms for several network and security conditions and requirements. In addition to the saving of the resources represented by the communication, computation and memory, we provide an extension for special-case networks in which our work can provide a higher performance.

Original languageEnglish
Title of host publicationUbiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings
PublisherSpringer Verlag
Pages1222-1232
Number of pages11
ISBN (Print)9783540735489
DOIs
StatePublished - 2007
Event4th International Conference on Ubiquitous Intelligence and Computing: Building Smart Worlds in Real and Cyber Spaces, UIC 2007 - Hong Kong, Hong Kong
Duration: 11 Jul 200713 Jul 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4611 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference4th International Conference on Ubiquitous Intelligence and Computing: Building Smart Worlds in Real and Cyber Spaces, UIC 2007
Country/TerritoryHong Kong
CityHong Kong
Period11/07/0713/07/07

Bibliographical note

Funding Information:
The author would like to express his thanks to Hiroyuki Hirashita, Mitsuru Takeuchi, Toshihiro Kawaguchi, Jun Fukue, Shoji Kato, and Roberto Terlevich for their numerous comments and to referee for his/her meaningful suggestions. The author is also grateful to Shin Mineshige for his valuable discussions and kind reading of the previous draft. This work was supported in part by the Japan Society for the Promotion of Science (9852).

Fingerprint

Dive into the research topics of 'Secret key revocation in sensor networks'. Together they form a unique fingerprint.

Cite this