A key management scheme realising location privacy protection for heterogeneous wireless sensor networks Online publication date: Mon, 13-Jan-2020
by Erdong Yuan; Liejun Wang
International Journal of Sensor Networks (IJSNET), Vol. 32, No. 1, 2020
Abstract: Key management is the core of wireless sensor network (WSN) security management technology. At present, the protection of the source location information of nodes has also received great attention. In this paper, we combine identity-based encryption (IBE) algorithm with elliptic curve cryptography (ECC) based digital signature authentication to achieve more secure authentication. Then we use the double encryption method to realise the location privacy protection. Finally, we adopt a new routing update scheme to prevent attackers from initiating sinkhole attacks. In addition, we add timestamps to messages transmitted between nodes to defend against resend attacks. The scheme we proposed occupies a small amount of key storage space, consumes relatively more energy to protect the location information of nodes in the heterogeneous sensor network (HSN), and prevents attackers from initiating sinkhole attacks and resend attacks, thereby enhancing network security.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Sensor Networks (IJSNET):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com