Show simple item record

dc.contributor.authorLewis, Nathan Den_NZ
dc.contributor.authorFoukia, Noriaen_NZ
dc.contributor.authorGovan, Donovan Gen_NZ
dc.date.available2011-04-07T03:06:16Z
dc.date.copyright2007-09en_NZ
dc.identifier.citationLewis, N. D., Foukia, N., & Govan, D. G. (2007). Using trust for key distribution and route selection in wireless sensor networks (Information Science Discussion Papers Series No. 2007/07). University of Otago. Retrieved from http://hdl.handle.net/10523/1048en
dc.identifier.urihttp://hdl.handle.net/10523/1048
dc.descriptionSubmitted to IEEE/IFIP Network Operations and Management Symposium (NOMS 2008).en_NZ
dc.description.abstractThis paper presents a new approach of dynamic symmetric key distribution for encrypting the communication between two nodes in a Wireless Sensor Network (WSN). The distribution of a shared key can be performed by any sensor node and does not always require that it is performed by the base station (BS). Each node can be selected by one of its neighbor nodes in order to distribute a pair-wise key for a communication between two nodes. The selection is based on the local computation of a trust value granted by the requesting nodes. This scheme considerably reduces the cost of communication between the BS and the nodes when setting up pair-wise keys between neighboring nodes. This paper also describes a dynamic route selection mechanisms based on trust and cost, that each node performs to route data to neighbor nodes and to the BS.en_NZ
dc.format.mimetypeapplication/pdf
dc.publisherUniversity of Otagoen_NZ
dc.relation.ispartofseriesInformation Science Discussion Papers Seriesen_NZ
dc.subjectkey distributionen_NZ
dc.subjecttrusten_NZ
dc.subjectwireless sensor networken_NZ
dc.subjectroute selectionen_NZ
dc.subject.lcshQA76 Computer softwareen_NZ
dc.titleUsing trust for key distribution and route selection in wireless sensor networksen_NZ
dc.typeDiscussion Paperen_NZ
dc.description.versionUnpublisheden_NZ
otago.bitstream.pages9en_NZ
otago.date.accession2007-09-27en_NZ
otago.schoolInformation Scienceen_NZ
otago.openaccessOpen
otago.place.publicationDunedin, New Zealanden_NZ
dc.identifier.eprints728en_NZ
otago.school.eprintsInformation Scienceen_NZ
dc.description.references[1] K. Römer and F. Mattern, The Design Space of Wireless Sensor Networks, in IEEE Wireless Communications 11 (6):54-61, December 2004. [2] H. Chan and A. Perrig, Security and Privacy in Sensor Networks, In IEEE Computer, 36(10), October 2003, pp103-105. [3] S. A. Camtepe and B. Yener, Key Distribution Mechanism for Wireless Sensor Networks: a Survey, Department of Computer Science, Rensselaer Polytechnic Institute, Troy, New York, USA, TR-05-07, 2005. [4] W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge, in IEEE INFOCOM, 2004. [5] B. C. Neuman and T. Tso, Kerberos: An authentication service for computer networks, in EEE Communications, vol. 32, no. 9, pp. 33–38,September 1994. [6] G. Gaubatz, J. P. Kaps and B. Sunar, Public Key Cryptography in Sensor Networks - Revisited, In Proceedings of ESAS'04, C. Castelluccia and H. Hartenstein (Eds.), LNCS 3313, pp. 2-19, Springer, Heidelberg, 2004. [7] H. Zhu, B. Feng, and R. H. Deng, Computing of Trust in Distributed Networks, Cryptology ePrint Archive: Report 2003/056, Available at: http://eprint.iacr.org, 2003. [8] D. Artz and Y. Gil, A Survey of Trust in Computer Science and the Semantic Web, Information Sciences Institute, USC, USA, March 15, 2007. [9] OMNet++: http://www.omnetpp.org/en_NZ
otago.relation.number2007/07en_NZ
 Find in your library

Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record