Skip to main content

Key Management for Mobile Sensor Networks

  • Conference paper
Book cover Secure Mobile Ad-hoc Networks and Sensors (MADNES 2005)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4074))

Included in the following conference series:

Abstract

Key management is paramount for mobile sensor network (MSN) security. The special nature of MSNs imposes challenging requirements on key management design. We evaluate current key management techniques proposed for wireless sensor networks in the context of MSNs and identify open issues for future research. We also propose a novel approach to control and replace pool-based pre-distributed keys. The analysis in this paper shows that this approach keeps the initial connectivity and resiliency properties of the key pre-distribution scheme even when nodes and keys are revoked.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  2. Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-Secure Key Distribution for Dynamic Conferences, pp. 471–486 (1992)

    Google Scholar 

  3. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: ACM Conference on Computer and Communications Security, pp. 41–47 (2002)

    Google Scholar 

  4. Chan, H., Perrig, A., Song, D.X.: Random Key Predistribution Schemes for Sensor Networks. In: IEEE Symposium on Security and Privacy, p. 197 (2003)

    Google Scholar 

  5. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: ACM Conference on Computer and Communications Security, pp. 42–51 (2003)

    Google Scholar 

  6. Liu, D., Ning, P., Li, R.: Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur., 41–77 (2005)

    Google Scholar 

  7. Hwang, Kim, Y.: Revisiting random key pre-distribution schemes for wireless sensor networks. In: Proc. of the 2nd ACM SASN workshop, pp. 43–52 (2004)

    Google Scholar 

  8. Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: ACM CCS Conference, pp. 62–72 (2003)

    Google Scholar 

  9. Di Pietro, R., Mancini, L.V., Mei, A., Panconesi, A.: A Panconesi: Connectivity Properties of Secure Wireless Sensor Networks. In: Proc. of the 2nd ACM SASN workshop, pp. 53–58 (2004)

    Google Scholar 

  10. Basagni, S., Herrin, K., Rosti, E., Bruschi, D.: Secure pebblenets. In: Proc. of the 2nd ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 156–163 (2001)

    Google Scholar 

  11. Baldus, H., Klabunde, K., Müsch, G.: Reliable set-up of medical body-sensor networks. In: Karl, H., Wolisz, A., Willig, A. (eds.) EWSN 2004. LNCS, vol. 2920, pp. 353–363. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  12. Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L., Rubenstein, D.: Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with Zebranet. In: Proc. of the Tenth International Conference on Architectural Support for Programming Languages and Operating Systems (2002)

    Google Scholar 

  13. Çamtepe, S.A., Yener, B.: Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 293–308. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  14. Lee, J., Stinson, D.R.: Deterministic Key Predistribution Schemes for Distributed Sensor Networks. In: Proc. 11th International Workshop, pp. 294–307 (2004)

    Google Scholar 

  15. Sánchez, D., Baldus, H.: A Deterministic Pairwise Key Pre-distribution Scheme for Mobile Sensor Networks. In: Proc. of the First International Conference on Security and Privacy for Emerging Areas in Communication Networks, pp. 277–288 (2005)

    Google Scholar 

  16. Chan, H., Perrig, A., Song, D.: Key distribution techniques for sensor networks, pp. 277–303. Kluwer Academic Publishers, Dordrecht (2004)

    Google Scholar 

  17. Perrig, A., Szewczyk, R., Wen, V., Cullar, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. In: Proc. of MOBICOM (2001)

    Google Scholar 

  18. Romer, K., Mattern, F.: The design space of wireless sensor networks. IEEE Wireless Communications 11(6), 54–61 (2004)

    Article  Google Scholar 

  19. Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: Proc. of the Third International Symposium on Information Processing in Sensor Networks, pp. 259–268 (2004)

    Google Scholar 

  20. Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad-Hoc Networks. In: Proc. of the 6th International Conference on Mobile Computing and Networking, pp. 275–283 (2000)

    Google Scholar 

  21. Brutch, P., Ko, C.: Challenges in intrusion detection for wireless ad-hoc networks. In: Proc. of the Symposium on Applications and the Internet Workshops, pp. 368–373 (2003)

    Google Scholar 

  22. Ganeriwal, S., Srivastava, M.B.: Reputation-based Framework for High Integrity Sensor Networks. In: Proc. of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 66–77 (2004)

    Google Scholar 

  23. Watkins, D., Scott, C.: Methodology for evaluating the effectiveness of intrusion detection in tactical mobile ad-hoc networks. In: Proc. of the IEEE Wireless Communications and Networking Conference, vol. 1, pp. 622–627 (2004)

    Google Scholar 

  24. Nadkarni, K., Mishra, A.: A novel intrusion detection approach for wireless ad hoc networks. In: Proc. of the IEEE Wireless Communications and Networking Conference, vol. 2, pp. 831–836 (2004)

    Google Scholar 

  25. Spencer, J.: The Strange Logic of Random Graphs. Algorithms and combinatorics, vol. 22. Springer, Heidelberg (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sánchez, D.S., Baldus, H. (2006). Key Management for Mobile Sensor Networks. In: Burmester, M., Yasinsac, A. (eds) Secure Mobile Ad-hoc Networks and Sensors. MADNES 2005. Lecture Notes in Computer Science, vol 4074. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11801412_3

Download citation

  • DOI: https://doi.org/10.1007/11801412_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-36646-1

  • Online ISBN: 978-3-540-37863-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics