Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: IResearch Article A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks | Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 2011 Article ID 296704 10 pages doi 2011 296704 Research Article A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks Jen-Yan Huang I-En Liao and Hao-Wen Tang Department of Computer Science and Engineering National Chung Hsing University Taichung 402 Taiwan Correspondence should be addressed to I-En Liao ieliao@ Received 1 June 2010 Revised 13 September 2010 Accepted 23 October 2010 Academic Editor Damien Sauveron Copyright 2011 Jen-Yan Huang et al. This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use distribution and reproduction in any medium provided the original work is properly cited. Key encryption technology is a basic technique for protecting the secrecy of transmitted data among sensor nodes in wireless sensor networks. However sensor nodes are inherently limited by insufficient hardware resources such as memory capacity and battery lifetime. As a result few current key management schemes are appropriate for wireless sensor networks. This paper proposes a new key management method that uses dynamic key management schemes for heterogeneous sensor networks. The proposed scheme loads a hash function into the base station cluster heads and sensor nodes. The cluster heads and sensor nodes then generate their own keychains to provide forward authentication in case of key changes security breaches key changes due to security breaches. The cluster heads and sensor nodes establish pairwise keys to ensure transmission secrecy. The proposed scheme decreases the number of keys required for sensor nodes and cluster heads and is robust to the following attacks guessing attacks replay attacks man-in-the-middle attacks node capture attacks and denial-of-service attacks. 1. Introduction Wireless sensor networks WSNs consist of many sensor nodes capable of wireless .