39,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 6-10 Tagen
payback
20 °P sammeln
  • Broschiertes Buch

This research addresses communication security in wireless sensor networks by developing the Hierarchical Key Establishment Scheme (HIKES) which provides these networks with the basic security requirements and evaluating its effectiveness by implementing on an a routing platform. HIKES allows the central authority to empower sensors to issue secrets keys to local sensors for their communications. HIKES uses a novel key escrow scheme that enables any sensor node to represent the central authority to generate all the secret keys and authenticate other sensors. HIKES localizes secret key…mehr

Produktbeschreibung
This research addresses communication security in wireless sensor networks by developing the Hierarchical Key Establishment Scheme (HIKES) which provides these networks with the basic security requirements and evaluating its effectiveness by implementing on an a routing platform. HIKES allows the central authority to empower sensors to issue secrets keys to local sensors for their communications. HIKES uses a novel key escrow scheme that enables any sensor node to represent the central authority to generate all the secret keys and authenticate other sensors. HIKES localizes secret key issuance, thereby reducing the communication overhead. The key escrow scheme provides HIKES with a large a addressing mechanism. HIKES also provides source and data authentication, and is robust against most known attacks. A hierarchical routing mechanism called Secure Hierarchical Energy-Efficient Routing protocol (SHEER) that implements HIKES is proposed. Simulations have shown that HIKES providesan energy-efficient and scalable solution to the key management problem. HIKES also has low storage, and high address flexibility. Simulations show that SHEER is energy-efficient and is scalable.
Autorenporträt
Jamil Ibriq is currently a postgraduate researcher in the Tecore Network Lab in Department of Computer & Electrical Engineering and Computer Science at Florida Atlantic University. From January 2008 to May 2013, he was as an Assistant Professor at Dickinson State University, Dickinson, North Dakota. His research focus is on key management schemes