Abstract
Sensor networks are characterized by strict resource limitations and large scalability. Many sensor network applications require secure communication, a crucial component, especially in harsh environments. Symmetric key cryptography is very attractive in sensor networks due to its efficiency, but establishing a shared key for communicating parties is very challenging. The low computational capability and small storage budget within sensors render many popular public-key based key distribution and management mechanisms impractical. In this paper, we propose and analyze a truly in-situ key management scheme for large scale sensor networks, called: Public Key Management (PKM). In this scheme, we deploy service and worker sensors. The service sensors contain a key space, while worker sensors are deployed blind, with no pre-deployment knowledge. Worker sensors obtain security information from service sensors through a secure channel after deployment. After obtaining security information, worker sensors compute shared keys with their neighbors. For security reasons, service sensors erase stored key space information after deployment. During this procedure, PKM shifts a large amount of computational overhead from worker sensors to service sensors, thus conserving worker sensors’ resources. PKM’s performance, in terms of storage, computational overhead and resiliency, is very good.
The research of Dr. Xiuzhen Cheng is supported by NSF CAREER Award No. CNS-0347674.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
http://www.xbow.com/Products/Product_pdf_files/Wireless_pdf/6020-0042-06_B_MICA2.pdf
Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)
Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Prefectly-Secure Key Distribution for Dynamic Conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)
Carman, D.W., Kruus, P.S., Matt, B.J.: Constraints and Approaches for Distributed Sensor Network Security, NAI Labs Technical Report No. 00-010 (September 2000)
Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: IEEE SP 2003 (2003)
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: CCS 2003, Washington DC, USA, October 27-31, pp. 42–51 (2003)
Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In: IEEE INFOCOM 2004 (2004)
Erdős, Rényi: On Random Graphs I. Publ. Math. Debrecen 6, 290–297 (1959)
Eschenauer, L., Gligor, V.D.: A Key-Management Scheme for Distributed Sensor Networks. In: CCS 2002, Washington DC, USA, November 18-22, pp. 41–47 (2002)
Huang, S.C.-H., Cheng, M.X., Du, D.-Z.: GeoSENS: Geo-based SEnsor Network Secure Communication Protocol (2004) (manuscript)
Liu, D., Ning, P.: Location-Based Pairwise Key Establishments for Static Sensor Networks. In: Proc. 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 72–82 (2003)
Liu, D., Ning, P.: Establishing Pairwise Keys in Distributed Sensor Networks. In: ACM CCS 2003, pp. 52–60 (2003)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
Rabin, M.O.: Digitalized signatures and public key functions as intractable as factorization, MIT/LCS/TR-212, MIT (1979)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
An, F., Cheng, X., Rivera, J.M., Li, J., Cheng, Z. (2005). PKM: A Pairwise Key Management Scheme for Wireless Sensor Networks. In: Lu, X., Zhao, W. (eds) Networking and Mobile Computing. ICCNMC 2005. Lecture Notes in Computer Science, vol 3619. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11534310_104
Download citation
DOI: https://doi.org/10.1007/11534310_104
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-28102-3
Online ISBN: 978-3-540-31868-2
eBook Packages: Computer ScienceComputer Science (R0)