Abstract
Wireless Sensor Network (WSN) consists of huge number of sensor nodes which are small and inexpensive with very limited resources. The public key cryptography is undesirable to be used in WSN because of the limitations of the resources. A key management and predistribution techniques are required to apply the symmetric key cryptography in such a big network. Many key predistribution techniques and approaches have been proposed, but few of them considered the real WSN assumptions. In this paper, we propose a security framework that is based on a hierarchical grid for WSN considering the proper assumptions of the communication traffic and required connectivity. We apply simple keying material distribution scheme to measure the value of our framework. Finally, we provide security analysis for possible security threats in WSN.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: A Survey. Computer Networks Journal 38(4), 393–422 (2002)
Blom, R.: An optimal class of symmetric key generation systems, Advances in Cryptography. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)
Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)
Camtepe, S.A., Yener, B.: Key Distribution Mechanisms for Wireless Sensor Networks: a Survey, Rensselaer Polytechnic Institute RPI, Technical Report TR-05-07 (March 23, 2005)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, May 2003, pp. 197–213 (2003)
Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inform. Theory IT-22, 644–654 (1976)
Du, W., Deng, J., Han, Y.S., Varshney, P.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of 10th ACM Conf. on Computer and Communications Security (CCS 2003), pp. 42–51 (2003)
Eschenauer, L., Gligor, V.D.: A key management scheme for distributed sensor networks. In: Proceeding of the 9th ACM Conf. on Computer and Communications Security, pp. 41–47 (2002)
Huang, D., Mehta, M., Mehdi, D., Harm, L.: Location-aware Key Management Scheme for Wireless Sensor Networks. In: Proc. of 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2004), October 2004, pp. 29–42 (2004)
Hwang, J.M., Kim, Y.D.: Revisiting random key pre-distribution schemes for wireless sensor networks. In: Workshop on Security of ad hoc and Sensor Networks archive, Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 43–52 (2004)
Li, J., Janotti, J., DeCouto, D.S.J., Karger, D.R., Morris, R.: A Scalable Location Service for Geographic Ad Hoc Routing. In: The Sixth Annual International Conf. on Mobile Computing and Networking, August 2000, pp. 120–130 (2000)
Liu, D., Ning, P.: Establishing Pairwise keys in distributed sensor networks. In: Proceedings of 10th ACM Conf. on Computer and Communications Security (CCS 2003), pp. 52–61 (2003)
McCune, J., Shi, E., Perrig, A., Reiter, M.: Detection of Denial-of-Message Attacks on Sensor Network Broadcasts. In: Proceedings of the IEEE Symposium on Security and Privacy (May 2005)
Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil Attack in Sensor Networks: Analysis and Defense. In: Proceedings of Information Processing in Sensor Networks (IPSN) (April 2004)
Parno, B., Perrig, A., Gligor, V.: Distributed Detection of Node Replication Attacks in Sensor Networks. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy (May 2005)
Perrig, A., Szewczyk, R., Wen, V., Culler, D.E., Tygar, J.D.: SPINS: security protocols for sensor networks. In: MOBICOM, pp. 189–199 (2001)
Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)
Schmidt, J.S., Krahn, H., Fischer, S., Watjen, D.: A Security Architecture for Mobile Wireless Sensor Networks. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 166–177. Springer, Heidelberg (2005)
Wood, A., Stankovic, J.A.: Denial of Service in Sensor Networks. IEEE Computer 35(10), 54–62 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mohaisen, A., Nyang, DH. (2006). Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Wireless Sensor Networks. In: Römer, K., Karl, H., Mattern, F. (eds) Wireless Sensor Networks. EWSN 2006. Lecture Notes in Computer Science, vol 3868. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11669463_9
Download citation
DOI: https://doi.org/10.1007/11669463_9
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-32158-3
Online ISBN: 978-3-540-32159-0
eBook Packages: Computer ScienceComputer Science (R0)