Off-campus UNL users: To download campus access dissertations, please use the following link to log into our proxy server with your NU ID and password. When you are done browsing please remember to return to this page and log out.

Non-UNL users: Please talk to your librarian about requesting this dissertation through interlibrary loan.

Key management protocols in hybrid wireless sensor networks

Yong Wang, University of Nebraska - Lincoln


Wireless sensor networks (WSNs) use sensors to monitor phenomena such as temperature, humidity, groundwater levels and transmit this information to a base station using wireless channels. WSNs find applications in military, ecological, and health-related areas. A hybrid wireless sensor network includes two networks: an ad hoc wireless network and a wireless sensor network. The nodes in the ad hoc network act as base stations conducting surveillance on the WSN. In this dissertation, we focus on the key management issues in hybrid wireless sensor networks. The key management issues in hybrid wireless sensor networks can be divided into three categories according to which layer they affect: ad hoc network layer, wireless sensor network layer, and integrated cross layer. ^ At the ad hoc network layer, we propose two elliptic curve discrete logarithm problem (ECDLP) based schemes for secure group communication (SGC). Unlike the vast majority of secure group communication protocols using the discrete logarithm problem (DLP) based Diffie-Hellman as the basic key agreement protocol, our solutions use the ECDLP-based Diffie-Hellman protocol. We also extend our research on secure group communication to the wireless sensor network layer. We formally define the grouping and secure group communication problems in WSNs. We further propose and evaluate four centralized group rekeying (CGK) schemes for SGC in WSNs. Our proposed key management protocol at the integrated cross layer, mKeying, includes two schemes, a key distribution scheme, KeyDist, supporting multiple base stations in the network, and a centralized key revocation scheme, KeyRev, for removing compromised sensor nodes from the sensor network. Through these protocols for key distribution, key revocation, and group communication, we present an integrated approach to provide security in hybrid wireless sensor networks.^

Subject Area

Computer Science

Recommended Citation

Wang, Yong, "Key management protocols in hybrid wireless sensor networks" (2007). ETD collection for University of Nebraska - Lincoln. AAI3277703.