Skip to main content

Diverging Keys in Wireless Sensor Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4176))

Abstract

Currently, the most popular ways of dealing with the key distribution problem in sensor networks are random predistribution schemes. For relaxed, realistic assumptions about the attacker, the key infection protocol [1] is also available. In this paper, by accepting the relaxed assumptions from [1], we propose a scheme which makes pairwise keys “drift” or diverge, which enhances security and can be used as a key distribution method. The most notable feature of this scheme is that, under some assumptions about the sensor nodes, it incurs no communication overhead at all.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R., Chan, H., Perrig, A.: Key infection: Smart Trust for Smart Dust. In: Proceedings of IEEE International Conference on Network Protocols (ICNP 2004) (October 2004)

    Google Scholar 

  2. Carman, D.W., Kruus, P.S., Matt, B.J.: Constraints and Approaches for Distributed Sensor Network Security. Technical Report 00–010, NAI Labs, Cryptographic Technologies Group Trusted Information Systems, NAI Labs, The Security Research Division Network Associates, Inc. 3060 Washington Road (Rt. 97) Glenwood, MD 21738-9745 (2000)

    Google Scholar 

  3. Chan, H., Perrig, A.: PIKE: Peer Intermediaries for Key Establishment in Sensor Networks. In: The 24th Conference of the IEEE Communications Society (Infocom 2005) (March 2005)

    Google Scholar 

  4. Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 197–213. IEEE Computer Society, Los Alamitos (2003)

    Google Scholar 

  5. Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A Pairwise Key Predistribution Scheme for Wireless Sensor Networks. ACM Transactions on Information and System Security 8(2), 228–258 (2005)

    Article  Google Scholar 

  6. Eschenauer, L., Gligor, V.D.: A Key-management Scheme for Distributed Sensor Networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002), pp. 41–47. ACM Press, New York (2002)

    Chapter  Google Scholar 

  7. Hu, Y.C., Perrig, A., Johnson, D.B.: Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks. In: The proceedings of INFOCOMM 2003 (2003)

    Google Scholar 

  8. Huang, D., Mehta, M., Medhi, D., Harn, L.: Locationaware Key Management Scheme for Wireless Sensor Networks. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2004), pp. 29–42. ACM Press, New York (2004)

    Chapter  Google Scholar 

  9. McCune, J.M., Shi, E., Perrig, A., Reiter, M.K.: Detection of Denial-of-Message Attacks on Sensor Network Broadcasts. In: IEEE Conference on Security and Privacy (2005)

    Google Scholar 

  10. Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil Attack in Sensor Networks: Analysis & Defenses. In: IPSN 2004, Barkley, California, USA, pp. 259–268 (April 26-27, 2004)

    Google Scholar 

  11. Parno, B., Perrig, A., Gligor, V.: Distributed Detection of Node Replication Attacks in Sensor Networks. In: IEEE S&P (2005)

    Google Scholar 

  12. Perrig, A., Szewczyk, R., Wen, V., Culler, D.E., Tygar, J.D.: SPINS: Security Protocols for Sensor Netowrks. In: Mobile Computing and Networking, pp. 189–199 (2001)

    Google Scholar 

  13. Tiri, K., Hwang, D., Hodjat, A., Lai, B.C., Yang, S., Schaumont, P., Verbauwhede, I.: AES-Based Cryptographic and Biometric Security Coprocessor IC in 0.18-um CMOS Resistant to Side-Channel Power Analysis Attacks. In: Proceedings of the Symposia on VLSI Technology and Circuits, pp. 216–219 (June 2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ren, M., Das, T.K., Jianying (2006). Diverging Keys in Wireless Sensor Networks. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds) Information Security. ISC 2006. Lecture Notes in Computer Science, vol 4176. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11836810_19

Download citation

  • DOI: https://doi.org/10.1007/11836810_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-38341-3

  • Online ISBN: 978-3-540-38343-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics