This paper defines a new protocol KeEs for the key establishment that meets the security requirements of the threat model proposed. The KeEs protocol assures forward and backward secrecy of the session key, so that if any set of the session keys is compromised, even including the current session key, these compromised keys do not undermine neither the security of future session keys, nor the security of past session keys. We illustrate the protocol in two different scenarios, one in which a Base Station acts as a synchronizer for re-keying the sensors, and a second scenario based on a completely distributed approach where the sensors rely only on themselves to achieve synchronization in the re-keying process. For both scenarios the KeEs protocol requires minimal overhead in terms of computations and transmissions. Finally, in KeES none of the resources needed by a generic sensor is bounded to the size of the WSN. © 2003 Elsevier B.V. All rights reserved.

Providing secrecy in key management protocols for large wireless sensors networks / Roberto Di, Pietro; Mancini, Luigi Vincenzo; Sushil, Jajodia. - In: AD HOC NETWORKS. - ISSN 1570-8705. - STAMPA. - 1:4(2003), pp. 455-468. [10.1016/s1570-8705(03)00046-5]

Providing secrecy in key management protocols for large wireless sensors networks

MANCINI, Luigi Vincenzo;
2003

Abstract

This paper defines a new protocol KeEs for the key establishment that meets the security requirements of the threat model proposed. The KeEs protocol assures forward and backward secrecy of the session key, so that if any set of the session keys is compromised, even including the current session key, these compromised keys do not undermine neither the security of future session keys, nor the security of past session keys. We illustrate the protocol in two different scenarios, one in which a Base Station acts as a synchronizer for re-keying the sensors, and a second scenario based on a completely distributed approach where the sensors rely only on themselves to achieve synchronization in the re-keying process. For both scenarios the KeEs protocol requires minimal overhead in terms of computations and transmissions. Finally, in KeES none of the resources needed by a generic sensor is bounded to the size of the WSN. © 2003 Elsevier B.V. All rights reserved.
2003
distributed algorithms; forward and backward secrecy; key management protocol; synchronization; wireless sensor network security
01 Pubblicazione su rivista::01a Articolo in rivista
Providing secrecy in key management protocols for large wireless sensors networks / Roberto Di, Pietro; Mancini, Luigi Vincenzo; Sushil, Jajodia. - In: AD HOC NETWORKS. - ISSN 1570-8705. - STAMPA. - 1:4(2003), pp. 455-468. [10.1016/s1570-8705(03)00046-5]
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/474100
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 56
  • ???jsp.display-item.citation.isi??? ND
social impact