Cryptography Reference
In-Depth Information
Chapter 6
Identity-Based Key
Distribution in Wireless
Sensor Networks
In This Chapter
• Introduction to key distribution in WSN
• Symmetric key algorithms for WSN
• Public key-distribution schemes
• ID-based bilinear key-distribution schemes
• Matsumoto-Imai's key-predistribution scheme
6.1 Introduction
Recent advances in Integrated Circuit (IC) fabrication have led to the proliferation of
wireless sensor networks (WSN), which comprise low-cost sensors with limited stor-
age and processing power. WSN have applicability in diverse fields, such as: military,
ocean, and wildlife monitoring; earthquake monitoring; safety monitoring in build-
ings; and in new smart home technology proposed by 4G technologies. However,
such networks deviate from legacy-embedded wireless networks in terms of scalability,
dynamic nature with regard to the addition or deletion of nodes, and deployment areas.
Hence, there is a greater challenge in providing security, by taking such harsh opera-
tional requirements into consideration. One such challenge is in key distribution and its
management. In addition, the lack of a-priori information about the topology of WSN
115
 
Search WWH ::




Custom Search