Show simple item record

dc.contributor.authorSingh, Kalvinderen_US
dc.contributor.authorMuthukkumarasamy, Vallipuramen_US
dc.contributor.editorNiki Pissinouen_US
dc.date.accessioned2017-04-24T11:12:39Z
dc.date.available2017-04-24T11:12:39Z
dc.date.issued2008en_US
dc.date.modified2010-01-13T06:51:25Z
dc.identifier.issn1796-2056en_US
dc.identifier.urihttp://hdl.handle.net/10072/23507
dc.description.abstractWireless sensor networks provide solutions to a range of monitoring problems. However, they introduce a new set of problems mainly due to small memories, weak processors, limited energy and small packet size. Thus only a very few conventional protocols can readily be used in sensor networks. This paper closely examines the currently available key distributions protocols, their strengths and limitations. The performance of these protocols under different scenarios are thoroughly investigated using theoretical analysis and using a simulation study with TinyOS. First a number of single server protocols were proposed and their performance was analysed. Then we propose a new set of multi-server key distribution protocols, where base stations (or controller nodes) are untrusted. The proposed solutions replicate the authentication server such that a group of malicious and colluding servers cannot compromise security or disrupt service. A detailed comparison of the performance of the proposed protocols with that of other available protocols show the advantages of our protocols. We show that the proposed multiple server authentication protocols will only have O(n) complexity, where n is the number of authentication servers. The protocols use information from the sensor nodes and the servers to generate a new key, and do not solely rely on the sensor nodes to generate good random numbers. The proposed protocols guarantee that the new key is fresh and that the communicating nodes use the same key.en_US
dc.description.peerreviewedYesen_US
dc.description.publicationstatusYesen_AU
dc.format.extent526055 bytes
dc.format.mimetypeapplication/pdf
dc.languageEnglishen_US
dc.language.isoen_AU
dc.publisherAcademy Publisheren_US
dc.publisher.placeOulu, Finlanden_US
dc.publisher.urihttp://academypublisher.com/ojs/index.php/jnw/article/view/03061328en_AU
dc.relation.ispartofstudentpublicationNen_AU
dc.relation.ispartofpagefrom13en_US
dc.relation.ispartofpageto28en_US
dc.relation.ispartofissue6en_US
dc.relation.ispartofjournalJournal of Networksen_US
dc.relation.ispartofvolume3en_US
dc.rights.retentionYen_AU
dc.subject.fieldofresearchInformation and Computing Sciences not elsewhere classifieden_US
dc.subject.fieldofresearchcode089999en_US
dc.titleAnalysis of Proposed Key Establishment Protocols in Multi-Tiered Sensor Networksen_US
dc.typeJournal articleen_US
dc.type.descriptionC1 - Peer Reviewed (HERDC)en_US
dc.type.codeC - Journal Articlesen_US
gro.facultyGriffith Sciences, School of Information and Communication Technologyen_US
gro.rights.copyrightCopyright 2008 Academy Publisher. The attached file is reproduced here in accordance with the copyright policy of the publisher. Please refer to the journal's website for access to the definitive, published version.en_AU
gro.date.issued2008
gro.hasfulltextFull Text


Files in this item

This item appears in the following Collection(s)

  • Journal articles
    Contains articles published by Griffith authors in scholarly journals.

Show simple item record