Reference Hub1
Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks

Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks

Jingyuan Rao, Min Tu, Xuanjin Yang
Copyright: © 2020 |Volume: 12 |Issue: 3 |Pages: 14
ISSN: 1941-6210|EISSN: 1941-6229|EISBN13: 9781799805816|DOI: 10.4018/IJDCF.2020070101
Cite Article Cite Article

MLA

Rao, Jingyuan, et al. "Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks." IJDCF vol.12, no.3 2020: pp.1-14. http://doi.org/10.4018/IJDCF.2020070101

APA

Rao, J., Tu, M., & Yang, X. (2020). Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks. International Journal of Digital Crime and Forensics (IJDCF), 12(3), 1-14. http://doi.org/10.4018/IJDCF.2020070101

Chicago

Rao, Jingyuan, Min Tu, and Xuanjin Yang. "Two Variations of Peer Intermediaries for Key Establishment in Sensor Networks," International Journal of Digital Crime and Forensics (IJDCF) 12, no.3: 1-14. http://doi.org/10.4018/IJDCF.2020070101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Recently, the issue pertinent to sensor network security is a popular topic. Especially, due to the restriction of energy supplied by battery power of the sensors, symmetric cryptography is one of the suitable choices for the secret communication between sensors, while asymmetric cryptography is not appropriate because of its heavy loading on computation should consume a lot of energy. As a result of using symmetric cryptography, there are numerous research papers focusing on designing efficient key management scheme in sensor networks. PIKE designed by Chan and Perrig is a scheme using peer intermediaries and their pre-installed keys to deliver secret message from one sensor to another. However, they did not consider the case that the sensors are scattered in nonuniform way. Moreover, O(logn) is enough for sensor networks to achieve expander topology while PIKE has O(√n) storage overhead. This article gives generalizations of PIKE to offer more choices for developers under different requirements. The Constant Storage Protocol, abbreviated as CSP, costs constant memory storage and is more suitable for group-based deployment.