A generic evaluation method for key management schemes in wireless sensor network

Ruan Na, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

Wireless sensor networks (WSN) have been widely used in various applications. Since their sensor nodes are resource-constrained, key management is one of the most challenging issues in design of WSN. Currently, various efficient lightweight key management schemes have been proposed to enable encryption and authentication in WSN for different application scenarios. According to different requirements, it is important to select the trustworthy key management schemes in a WSN for setting up a fully trusted WSN mechanism. In this context, adaptive methods are required to evaluate those schemes. In this paper, we exploit Analytic Hierarchy Process (AHP) to help with the complex decision. Specifically, we consider the following performance criteria: scalability, key connectivity, resilience, storage overhead, processing overhead and communication overhead. Our method is able help choosing a suitable scheme for given requirements.

Original languageEnglish
Title of host publicationProceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011
DOIs
Publication statusPublished - May 20 2011
Event5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011 - Seoul, Korea, Republic of
Duration: Feb 21 2011Feb 23 2011

Publication series

NameProceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011

Other

Other5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011
CountryKorea, Republic of
CitySeoul
Period2/21/112/23/11

Fingerprint

Wireless sensor networks
Analytic hierarchy process
Sensor nodes
Authentication
Cryptography
Scalability
Communication
Processing

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Information Systems

Cite this

Na, R., Ren, Y., Hori, Y., & Sakurai, K. (2011). A generic evaluation method for key management schemes in wireless sensor network. In Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011 [55] (Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011). https://doi.org/10.1145/1968613.1968680

A generic evaluation method for key management schemes in wireless sensor network. / Na, Ruan; Ren, Yizhi; Hori, Yoshiaki; Sakurai, Kouichi.

Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011. 2011. 55 (Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Na, R, Ren, Y, Hori, Y & Sakurai, K 2011, A generic evaluation method for key management schemes in wireless sensor network. in Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011., 55, Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011, 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011, Seoul, Korea, Republic of, 2/21/11. https://doi.org/10.1145/1968613.1968680
Na R, Ren Y, Hori Y, Sakurai K. A generic evaluation method for key management schemes in wireless sensor network. In Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011. 2011. 55. (Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011). https://doi.org/10.1145/1968613.1968680
Na, Ruan ; Ren, Yizhi ; Hori, Yoshiaki ; Sakurai, Kouichi. / A generic evaluation method for key management schemes in wireless sensor network. Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011. 2011. (Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011).
@inproceedings{ca28f71711fa484994b1cbf7f571f18f,
title = "A generic evaluation method for key management schemes in wireless sensor network",
abstract = "Wireless sensor networks (WSN) have been widely used in various applications. Since their sensor nodes are resource-constrained, key management is one of the most challenging issues in design of WSN. Currently, various efficient lightweight key management schemes have been proposed to enable encryption and authentication in WSN for different application scenarios. According to different requirements, it is important to select the trustworthy key management schemes in a WSN for setting up a fully trusted WSN mechanism. In this context, adaptive methods are required to evaluate those schemes. In this paper, we exploit Analytic Hierarchy Process (AHP) to help with the complex decision. Specifically, we consider the following performance criteria: scalability, key connectivity, resilience, storage overhead, processing overhead and communication overhead. Our method is able help choosing a suitable scheme for given requirements.",
author = "Ruan Na and Yizhi Ren and Yoshiaki Hori and Kouichi Sakurai",
year = "2011",
month = "5",
day = "20",
doi = "10.1145/1968613.1968680",
language = "English",
isbn = "9781450305716",
series = "Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011",
booktitle = "Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011",

}

TY - GEN

T1 - A generic evaluation method for key management schemes in wireless sensor network

AU - Na, Ruan

AU - Ren, Yizhi

AU - Hori, Yoshiaki

AU - Sakurai, Kouichi

PY - 2011/5/20

Y1 - 2011/5/20

N2 - Wireless sensor networks (WSN) have been widely used in various applications. Since their sensor nodes are resource-constrained, key management is one of the most challenging issues in design of WSN. Currently, various efficient lightweight key management schemes have been proposed to enable encryption and authentication in WSN for different application scenarios. According to different requirements, it is important to select the trustworthy key management schemes in a WSN for setting up a fully trusted WSN mechanism. In this context, adaptive methods are required to evaluate those schemes. In this paper, we exploit Analytic Hierarchy Process (AHP) to help with the complex decision. Specifically, we consider the following performance criteria: scalability, key connectivity, resilience, storage overhead, processing overhead and communication overhead. Our method is able help choosing a suitable scheme for given requirements.

AB - Wireless sensor networks (WSN) have been widely used in various applications. Since their sensor nodes are resource-constrained, key management is one of the most challenging issues in design of WSN. Currently, various efficient lightweight key management schemes have been proposed to enable encryption and authentication in WSN for different application scenarios. According to different requirements, it is important to select the trustworthy key management schemes in a WSN for setting up a fully trusted WSN mechanism. In this context, adaptive methods are required to evaluate those schemes. In this paper, we exploit Analytic Hierarchy Process (AHP) to help with the complex decision. Specifically, we consider the following performance criteria: scalability, key connectivity, resilience, storage overhead, processing overhead and communication overhead. Our method is able help choosing a suitable scheme for given requirements.

UR - http://www.scopus.com/inward/record.url?scp=79956046069&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=79956046069&partnerID=8YFLogxK

U2 - 10.1145/1968613.1968680

DO - 10.1145/1968613.1968680

M3 - Conference contribution

AN - SCOPUS:79956046069

SN - 9781450305716

T3 - Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011

BT - Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011

ER -