Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
162 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

An Efficient Key Agreement Scheme for Wireless Sensor Networks Using Third Parties (1309.2334v1)

Published 9 Sep 2013 in cs.CR and cs.DC

Abstract: This paper contributes to the challenging field of security for wireless sensor networks by introducing a key agreement scheme in which sensor nodes create secure radio connections with their neighbours depending on the aid of third parties. These third parties are responsible only for the pair-wise key establishment among sensor nodes, so they do not observe the physical phenomenon nor route data packets to other nodes. The proposed method is explained here with respect to four important issues: how secret shares are distributed, how local neighbours are discovered, how legitimate third parties are verified, and how secure channels are established. Moreover, the performance of the scheme is analyzed with regards to five metrics: local connectivity, resistance to node capture, memory usage, communication overhead, and computational burden. Our scheme not only secures the transmission channels of nodes but also guarantees high local connectivity of the sensor network, low usage of memory resources, perfect network resilience against node capture, and complete prevention against impersonation attacks. As it is demonstrated in this paper, using a number of third parties equals to 10% of the total number of sensor nodes in the area of interest, the proposed method can achieve at least 99.42% local connectivity with a very low usage of available storage resources (less than 385 bits on each sensor node).

Citations (2)

Summary

We haven't generated a summary for this paper yet.