Skip to main content

Flexible Deployment Models for Location-Aware Key Management in Wireless Sensor Networks

  • Conference paper
Book cover Frontiers of WWW Research and Development - APWeb 2006 (APWeb 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3841))

Included in the following conference series:

  • 799 Accesses

Abstract

Location-aware key management schemes, which take deployment information as a priori, can effectively strengthen the resilience against attacks for Wireless Sensor Networks. However, they also raise several new challenges such as deployment flexibility, inter-group connectivity, and security resilience. Aiming at these challenges, we propose three flexible deployment models and the corresponding key management scheme in this paper. We provide analytical evaluations of the proposed models and key management scheme. The results indicate that our approaches achieve a wonderful performance in inter-group connectivity, deployment flexibility, as well as resilience in security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. In: First IEEE International Workshop on Sensor Network Protocols and Applications (May 2003)

    Google Scholar 

  2. Eschenauer, L., Gligor, V.: A Key-Management Scheme for Distributed Sensor Networks. In: Proc. of ACM CCS 2002 (2002)

    Google Scholar 

  3. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks, Security and Privacy. In: Proceedings. 2003 Symposium on, May 11-14, pp. 197–213 (2003)

    Google Scholar 

  4. Liu, D., Ning, P.: Establishing Pairwise Keys in Distributed Sensor Networks. In: 10th ACM Conference on Computer and Communications Security (CCS 2003), Washington DC (October 2003); G/A

    Google Scholar 

  5. Du, W., Deng, J., Han, Y.S., Varshney, P.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), Washington DC, October 27-31 (2003)

    Google Scholar 

  6. Di Pietro, R., Mancini, L.V., Mei, A.: Efficient and resilient key discovery based on pseudo-random key pre-deployment. In: Parallel and Distributed Processing Symposium, 2004. Proceedings. 18th International, April 26-30, p. 217 (2004)

    Google Scholar 

  7. Zhu, S., Xu, S., Setia, S., Jajodia, S.: Establishing Pair-wise Keys For Secure Communication in Ad Hoc Networks: A Probabilistic Approach. In: Proc. of the 11th IEEE International Conference on Network Protocols (ICNP 2003), Atlanta, Georgia, November 4-7 (2003)

    Google Scholar 

  8. Liu, D., Ning, P.: Location-Based Pairwise Key Establishments for Static Sensor Networks. In: 2003 ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN 2003) (October 2003)

    Google Scholar 

  9. Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In: Proceedings of the IEEE INFOCOM 2004, Hongkong, March 7-11, pp. 586–597 (2004)

    Google Scholar 

  10. Huang, D., Mehta, M., Medhi, D., Harn, L.: Location-aware Key Management Scheme for Wireless Sensor Networks. In: Proceedings of 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2004, in conjunction with ACM CCS 2004), October 25, pp. 29–42 (2004)

    Google Scholar 

  11. Corke, P., Hrabar, S., Peterson, R., Rus, D., Saripalli, S., Sukhatme, G.: Autonomous deployment and repair of a sensor network using an unmanned aerial vehicle, Robotics and Automation, 2004. In: Proceedings. ICRA 2004. 2004 IEEE International Conference on, April 26-May 1, vol. 4, pp. 3602–3608 (2004)

    Google Scholar 

  12. Watro, R., Kong, D., fen Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: TinyPK: Securing Sensor Networks with Public Key Technology in ACM SASN, Washington, DC (October 2004)

    Google Scholar 

  13. Du, W., Wang, R., Ning, P.: An Efficient Scheme for Authenticating Public Keys in Sensor Networks. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), Urbana-Champaign, Illinois, USA, May 25-28 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yu, B., Cao, X., Han, P., Mao, D., Gao, C. (2006). Flexible Deployment Models for Location-Aware Key Management in Wireless Sensor Networks. In: Zhou, X., Li, J., Shen, H.T., Kitsuregawa, M., Zhang, Y. (eds) Frontiers of WWW Research and Development - APWeb 2006. APWeb 2006. Lecture Notes in Computer Science, vol 3841. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11610113_31

Download citation

  • DOI: https://doi.org/10.1007/11610113_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-31142-3

  • Online ISBN: 978-3-540-32437-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics