TY - GEN
T1 - A generic evaluation method for key management schemes in wireless sensor network
AU - Na, Ruan
AU - Ren, Yizhi
AU - Hori, Yoshiaki
AU - Sakurai, Kouichi
PY - 2011/5/20
Y1 - 2011/5/20
N2 - Wireless sensor networks (WSN) have been widely used in various applications. Since their sensor nodes are resource-constrained, key management is one of the most challenging issues in design of WSN. Currently, various efficient lightweight key management schemes have been proposed to enable encryption and authentication in WSN for different application scenarios. According to different requirements, it is important to select the trustworthy key management schemes in a WSN for setting up a fully trusted WSN mechanism. In this context, adaptive methods are required to evaluate those schemes. In this paper, we exploit Analytic Hierarchy Process (AHP) to help with the complex decision. Specifically, we consider the following performance criteria: scalability, key connectivity, resilience, storage overhead, processing overhead and communication overhead. Our method is able help choosing a suitable scheme for given requirements.
AB - Wireless sensor networks (WSN) have been widely used in various applications. Since their sensor nodes are resource-constrained, key management is one of the most challenging issues in design of WSN. Currently, various efficient lightweight key management schemes have been proposed to enable encryption and authentication in WSN for different application scenarios. According to different requirements, it is important to select the trustworthy key management schemes in a WSN for setting up a fully trusted WSN mechanism. In this context, adaptive methods are required to evaluate those schemes. In this paper, we exploit Analytic Hierarchy Process (AHP) to help with the complex decision. Specifically, we consider the following performance criteria: scalability, key connectivity, resilience, storage overhead, processing overhead and communication overhead. Our method is able help choosing a suitable scheme for given requirements.
UR - http://www.scopus.com/inward/record.url?scp=79956046069&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79956046069&partnerID=8YFLogxK
U2 - 10.1145/1968613.1968680
DO - 10.1145/1968613.1968680
M3 - Conference contribution
AN - SCOPUS:79956046069
SN - 9781450305716
T3 - Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011
BT - Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011
T2 - 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011
Y2 - 21 February 2011 through 23 February 2011
ER -