Abstract
Key management is paramount for mobile sensor network (MSN) security. The special nature of MSNs imposes challenging requirements on key management design. We evaluate current key management techniques proposed for wireless sensor networks in the context of MSNs and identify open issues for future research. We also propose a novel approach to control and replace pool-based pre-distributed keys. The analysis in this paper shows that this approach keeps the initial connectivity and resiliency properties of the key pre-distribution scheme even when nodes and keys are revoked.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)
Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-Secure Key Distribution for Dynamic Conferences, pp. 471–486 (1992)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: ACM Conference on Computer and Communications Security, pp. 41–47 (2002)
Chan, H., Perrig, A., Song, D.X.: Random Key Predistribution Schemes for Sensor Networks. In: IEEE Symposium on Security and Privacy, p. 197 (2003)
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: ACM Conference on Computer and Communications Security, pp. 42–51 (2003)
Liu, D., Ning, P., Li, R.: Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur., 41–77 (2005)
Hwang, Kim, Y.: Revisiting random key pre-distribution schemes for wireless sensor networks. In: Proc. of the 2nd ACM SASN workshop, pp. 43–52 (2004)
Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: ACM CCS Conference, pp. 62–72 (2003)
Di Pietro, R., Mancini, L.V., Mei, A., Panconesi, A.: A Panconesi: Connectivity Properties of Secure Wireless Sensor Networks. In: Proc. of the 2nd ACM SASN workshop, pp. 53–58 (2004)
Basagni, S., Herrin, K., Rosti, E., Bruschi, D.: Secure pebblenets. In: Proc. of the 2nd ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 156–163 (2001)
Baldus, H., Klabunde, K., Müsch, G.: Reliable set-up of medical body-sensor networks. In: Karl, H., Wolisz, A., Willig, A. (eds.) EWSN 2004. LNCS, vol. 2920, pp. 353–363. Springer, Heidelberg (2004)
Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L., Rubenstein, D.: Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with Zebranet. In: Proc. of the Tenth International Conference on Architectural Support for Programming Languages and Operating Systems (2002)
Çamtepe, S.A., Yener, B.: Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 293–308. Springer, Heidelberg (2004)
Lee, J., Stinson, D.R.: Deterministic Key Predistribution Schemes for Distributed Sensor Networks. In: Proc. 11th International Workshop, pp. 294–307 (2004)
Sánchez, D., Baldus, H.: A Deterministic Pairwise Key Pre-distribution Scheme for Mobile Sensor Networks. In: Proc. of the First International Conference on Security and Privacy for Emerging Areas in Communication Networks, pp. 277–288 (2005)
Chan, H., Perrig, A., Song, D.: Key distribution techniques for sensor networks, pp. 277–303. Kluwer Academic Publishers, Dordrecht (2004)
Perrig, A., Szewczyk, R., Wen, V., Cullar, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. In: Proc. of MOBICOM (2001)
Romer, K., Mattern, F.: The design space of wireless sensor networks. IEEE Wireless Communications 11(6), 54–61 (2004)
Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: Proc. of the Third International Symposium on Information Processing in Sensor Networks, pp. 259–268 (2004)
Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad-Hoc Networks. In: Proc. of the 6th International Conference on Mobile Computing and Networking, pp. 275–283 (2000)
Brutch, P., Ko, C.: Challenges in intrusion detection for wireless ad-hoc networks. In: Proc. of the Symposium on Applications and the Internet Workshops, pp. 368–373 (2003)
Ganeriwal, S., Srivastava, M.B.: Reputation-based Framework for High Integrity Sensor Networks. In: Proc. of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 66–77 (2004)
Watkins, D., Scott, C.: Methodology for evaluating the effectiveness of intrusion detection in tactical mobile ad-hoc networks. In: Proc. of the IEEE Wireless Communications and Networking Conference, vol. 1, pp. 622–627 (2004)
Nadkarni, K., Mishra, A.: A novel intrusion detection approach for wireless ad hoc networks. In: Proc. of the IEEE Wireless Communications and Networking Conference, vol. 2, pp. 831–836 (2004)
Spencer, J.: The Strange Logic of Random Graphs. Algorithms and combinatorics, vol. 22. Springer, Heidelberg (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sánchez, D.S., Baldus, H. (2006). Key Management for Mobile Sensor Networks. In: Burmester, M., Yasinsac, A. (eds) Secure Mobile Ad-hoc Networks and Sensors. MADNES 2005. Lecture Notes in Computer Science, vol 4074. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11801412_3
Download citation
DOI: https://doi.org/10.1007/11801412_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-36646-1
Online ISBN: 978-3-540-37863-1
eBook Packages: Computer ScienceComputer Science (R0)