Mustafa Kuscu - Academia.edu (original) (raw)

Mustafa Kuscu

Uploads

Papers by Mustafa Kuscu

Research paper thumbnail of A Low-Energy Key Management Protocol for Wireless Sensor Networks

Wireless sensor networks have a wide spectrum of civil and military applications that call for se... more Wireless sensor networks have a wide spectrum of civil and military applications that call for security, e.g., target surveillance in hostile environments. Typical sensors possess limited computation, energy, and memory resources; therefore the use of vastly resourceconsuming security mechanisms is not possible. In this paper, we propose a cryptographic key management protocol, which is based on the IBSK scheme, but only two symmetric keys are required to be pre-deployed at each sensor. The protocol supports the eviction of the compromised nodes. Simulation shows that the energy consumption overhead introduced by the key management is remarkably low thanks to the multi-tier network architecture in which only sensor-to-gateway secure sessions are allowed, and reports order-of-magnitude improvement in energy saving as compared to the original IBSK scheme, and Kerberos-like schemes.

Research paper thumbnail of A Low-Energy Key Management Protocol for Wireless Sensor Networks

Wireless sensor networks have a wide spectrum of civil and military applications that call for se... more Wireless sensor networks have a wide spectrum of civil and military applications that call for security, e.g., target surveillance in hostile environments. Typical sensors possess limited computation, energy, and memory resources; therefore the use of vastly resourceconsuming security mechanisms is not possible. In this paper, we propose a cryptographic key management protocol, which is based on the IBSK scheme, but only two symmetric keys are required to be pre-deployed at each sensor. The protocol supports the eviction of the compromised nodes. Simulation shows that the energy consumption overhead introduced by the key management is remarkably low thanks to the multi-tier network architecture in which only sensor-to-gateway secure sessions are allowed, and reports order-of-magnitude improvement in energy saving as compared to the original IBSK scheme, and Kerberos-like schemes.

Log In