Previous [ 1] [ 2] [ 3] [ 4] [ 5] [ 6] [ 7] [ 8] [ 9] [ 10] [ 11] [ 12] [ 13] [ 14] [ 15] [ 16] [ 17] [ 18] [ 19] [ 20] [ 21] [ 22] [ 23]

@

Journal of Information Science and Engineering, Vol. 26 No. 5, pp. 1859-1873 (September 2010)

A Node Revocation Scheme Using Public-Key Cryptography in Wireless Sensor Networks*

PO-JEN CHUANG, SHAO-HSUAN CHANG AND CHIH-SHIN LIN
Department of Electrical Engineering
Tamkang University
Tamsui, Taipei County, 251 Taiwan
E-mail: pjchuang@ee.tku.edu.tw

Generally deployed in an unattended environment, a sensor network can be easily assaulted or compromised by adversaries. Network security becomes a major problem. A distributed node revocation scheme is effective in reducing the damages a compromised node may cause to a sensor network, but its operation tends to consume large-scale memory space of the hardware-constrained sensor nodes. To reduce such complexity, this paper presents a new distributed voting revocation scheme based on the one-way hash chain, the certificate revocation list and the public-key cryptography. Performance evaluation shows that our scheme outperforms the other target schemes in enhancing network security at reasonable calculation cost which is acceptable to the sensor nodes.

Keywords: wireless sensor networks, network security, distributed node revocation schemes, one-way hash chains, certificate revocation lists, public-key cryptography, performance evaluation

Full Text () Retrieve PDF document (201009_19.pdf)

Received September 15, 2008; revised January 20 & May 6 & July 27, 2009; accepted September 3, 2009.
Communicated by Chin-Laung Lei.
* This work was supported in part by the National Science Council, Taiwan, R.O.C., under Grant No. NSC 97-2221-E-032-018 and was presented at the International Conference on Future Generation Communication and Networking, Jeju Island, Korea, Dec. 2007.