Text size
  • Small
  • Medium
  • Large
  • Standard
  • Blue text on blue
  • High contrast (Yellow text on black)
  • Blue text on beige

    Framework for Key Management Scheme in Heterogeneous Wireless Sensor Networks

    iUBICOM ’10: The 5th International Workshop on Ubiquitous and Collaborative Computing

    In conjunction with the 24th BCS Conference on Human Computer Interaction (HCI 2010)

    University of Abertay, Dundee, 7 September 2010


    Kamal Kumar, A.K. Verma and R.B. Patel


    Ubiquitous computing environments find their practical implementations through wireless sensor networks, which sense a relationship among themselves and the environment. Presently devised key management schemes are classified namely for homogeneous environments, or heterogeneous environments. In this paper, we propose a deployment conscious security framework supporting, a shift of complex operations to more capable nodes of heterogeneous environment and relieving resource constrained generic sensor nodes of major activities. We introduced a concept of deployment knowledge independent group key generation using a special kind of heterogeneitymultilevel transmission. Performance of proposed key management schemes is evaluated across relevant matrices and concluded to be satisfactory. Findings show that asymmetric key cryptography is comparatively more demanding in resources than symmetric version but ensures maximum security. Through our work we able to conclude that a hybrid of asymmetric and symmetric key cryptography best suits heterogeneous environments.


    PDF filePDF Version of this Paper  (168kb)