Skip to main content

Pairwise Key Setup and Authentication Utilizing Deployment Information for Secure Sensor Network

  • Conference paper
High Performance Computing and Communications (HPCC 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4208))

  • 791 Accesses

Abstract

For secure sensor network communications, pairwise key establishment between sensor nodes and data authentication are essential. In this paper, we propose cluster based key establishment mechanism in which clusterheads distribute key materials at the requests of their own members and an authentication mechanism using the pairwise keys established. Our proposal increases the degree of network connectivity and resilience against node capture by utilizing clusterheads which carry more key-related information. It also increases the authenticity of sensed data and further decreases unnecessary traffic by filtering false data.

This research was supported by the MIC(Ministry of Information and Communication), Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Assessment).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Carman, D.W., Kruus, P.S., Matt, B.J.: Constraints and approaches for distributed sensor network security, Technical report, NAI Labs (2000)

    Google Scholar 

  2. Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  3. Eschenauer, L., Gligor, V.D.: A key management scheme for distributed sensor networks. In: Proc. of the 9th ACM CCS 2002, pp. 41–47 (2002)

    Google Scholar 

  4. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Research in Security and Privacy, pp. 197–213 (2003)

    Google Scholar 

  5. Du, W., Deng, J., Han, Y.S., Varshney, P.: A pairwise key predistribution scheme for wireless sensor networks. In: Proc. of 10th ACM CCS 2003 (2003)

    Google Scholar 

  6. Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proc. of 10th ACM CCS 2003, pp. 52–61 (2003)

    Google Scholar 

  7. Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)

    Google Scholar 

  8. Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.: A key management scheme for wireless sensor networks using deployment knowledge. In: Proc. of IEEE INFOCOM (2004)

    Google Scholar 

  9. Yu, Z., Guan, Y.: A Robust Group-based Key Management Scheme for Wireless Sensor Networks. IEEE Communications Society, WCNC (2005)

    Google Scholar 

  10. Zhu, S., Setia, S., Jajodia, S., Ning, P.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In: Proc. of IEEE Symposium on Security and Privacy (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Doh, I., Park, JM., Chae, K. (2006). Pairwise Key Setup and Authentication Utilizing Deployment Information for Secure Sensor Network. In: Gerndt, M., Kranzlmüller, D. (eds) High Performance Computing and Communications. HPCC 2006. Lecture Notes in Computer Science, vol 4208. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11847366_29

Download citation

  • DOI: https://doi.org/10.1007/11847366_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-39368-9

  • Online ISBN: 978-3-540-39372-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics