Skip to main content

A Secure Key Agreement Scheme in Low-Energy Wireless Sensor Networks

  • Conference paper
Embedded and Ubiquitous Computing (EUC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 4096))

Included in the following conference series:

  • 734 Accesses

Abstract

Ubiquitous computing environment provides users with information access anytime and anywhere. In particular, sensor networks must be broadly deployed in real world and utilized to ensure the safety of the human life. In cryptography aspect, key agreement protocol is very important element to exchange messages safely between sensor nodes. This concern originates from the fact that sensor nodes are highly vulnerable to faults, energy depletions, and security attacks. The open problems are how to verify the identity of communicating nodes, how to set up a session key between communicating nodes, and how to minimize any information about the keys disclosed to the other side of key agreement. To solve above problems, we propose a secure key agreement scheme for low-energy sensor networks. Our scheme is based on the MRS scheme and enhances the security by hiding unshared keys and the number of shared keys. Besides, it resolves the weak points in encryption mechanism of MRS by employing multiple random numbers. Performance and security analyses have proven that our scheme is suitable for sensor networks in terms of availability and security aspects.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cam, H., Ozdemir, S., Muthuavinashiappan, D., Nair, P.: Energy-Efficient Security Protocol for Wireless Sensor Networks. In: Proc. of IEEE VTC Fall 2003 Conference, Orlando, October 4-9, pp. 2981–2984 (2003)

    Google Scholar 

  2. Eschenauer, L., Gligor, V.D.: A Key-management Scheme for DistributedSensor Networks. In: Proc. of the 9th ACM Conference on Computer and Communications Security, pp. 41–47 (2002)

    Google Scholar 

  3. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In: Proc. of ACM Conference on Computer and Communications Security (CCS 2003), pp. 42–51 (2003)

    Google Scholar 

  4. Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: IEEE Symposium on Research in Security and Privacy, May 11-14, 2003, pp. 197–213 (2003)

    Google Scholar 

  5. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In: IEEE INFOCOM, pp. 586–597 (2004)

    Google Scholar 

  6. Liu, D., Ning, P., Du, W.: Group-Based Key Pre-distribution in Wireless Sensor Networks. In: Proc. of 10th ACM Conference on Computer and Communications Security (CCS 2003), pp. 11–20 (2003)

    Google Scholar 

  7. Chan, A.C.-F.: Distributed Symmetric Key Management for Mobile Ad hoc Networks. IEEE INFOCOM, 2414–2424 (2004)

    Google Scholar 

  8. Rivest, R.L., Adleman, L., Dertouzos, M.L.: On Data Banks and Privacy. In: DeMillo, R.A., et al. (eds.) Foundations of Secure Computation, pp. 169–179. Academic Press, London (1978)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, T., Wang, G., Cho, G. (2006). A Secure Key Agreement Scheme in Low-Energy Wireless Sensor Networks. In: Sha, E., Han, SK., Xu, CZ., Kim, MH., Yang, L.T., Xiao, B. (eds) Embedded and Ubiquitous Computing. EUC 2006. Lecture Notes in Computer Science, vol 4096. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11802167_10

Download citation

  • DOI: https://doi.org/10.1007/11802167_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-36679-9

  • Online ISBN: 978-3-540-36681-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics