Skip to main content

A Key Management Scheme with Encoding and Improved Security for Wireless Sensor Networks

  • Conference paper
Distributed Computing and Internet Technology (ICDCIT 2006)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4317))

Abstract

Wireless sensor networks are emerging as a promising solution for various types of futuristic applications both for military and public. Security in wireless sensor networks is very crucial as these networks are expected mainly to operate in the hazardous and hostile environments. Efficient key management could guarantee authenticity and confidentiality of the data exchanged among the nodes in the network. In this paper, we propose an improved and efficient key pre-distribution scheme for wireless sensor networks. Our scheme significantly increases the storage efficiency and security than that of the previously proposed scheme based on LU decomposition. It also ensures node-to-node mutual authentication in a way that an eavesdropper cannot harm the network by monitoring the traffic flows in the network. We also present detailed performance analysis and compare our scheme with the existing schemes.

This work was supported by MIC and ITRC projects. Dr. C.S. Hong is the Corresponding Author.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s Ad Hoc Network Journal, Special Issue on Sensor Network Applications and Protocols, 293–315 (September 2003)

    Google Scholar 

  2. Pathan, A.-S.K., Lee, H.-W., Hong, C.S.: Security in Wireless Sensor Networks: Issues and Challenges. In: Proceedings of the 8th IEEE ICACT 2006, Phoenix Park, Korea, February 20-22, 2006, vol. II, pp. 1043–1048 (2006)

    Google Scholar 

  3. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. Wireless Networks 8(5), 521–534 (2002)

    Article  MATH  Google Scholar 

  4. Jolly, G., Kuscu, M.C., Kokate, P., Younis, M.: A Low-Energy Key Management Protocol for Wireless Sensor Networks. In: Proc. Eighth IEEE ISCC 2003, vol. 1, pp. 335–340 (2003)

    Google Scholar 

  5. Rabaey, J.M., Ammer, J., Karalar, T., Li, S., Otis, B., Sheets, M., Tuan, T.: PicoRadios for wireless sensor networks: the next challenge in ultra-low power design. In: IEEE ISSCC 2002, February 3-7, 2002, vol. 1, pp. 200–201 (2002)

    Google Scholar 

  6. Hollar, S.: COTS Dust. Master’s Thesis, Electrical Engineering and Computer Science Department, UC Berkeley (2000)

    Google Scholar 

  7. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proc. 2003 IEEE Symposium on Security and Privacy, May 11-14, 2003, pp. 197–213 (2003)

    Google Scholar 

  8. Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A Pairwise Key Predistribution Scheme for Wireless Sensor Networks. ACM Transactions on Information and System Security 8(2), 228–258 (2005)

    Article  Google Scholar 

  9. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and Communications, Washington, DC, USA, November 18-22, 2002, pp. 41–47 (2002)

    Google Scholar 

  10. Liu, D., Ning, P., Li, R.: Establishing Pairwise Keys in Distributed Sensor Networks. ACM Transactions on Information and System Security 8(1), 41–77 (2005)

    Article  Google Scholar 

  11. Choi, S., Youn, H.: An Efficient Key Pre-distribution Scheme for Secure Distributed Sensor Networks. In: Enokido, T., Yan, L., Xiao, B., Kim, D.Y., Dai, Y.-S., Yang, L.T. (eds.) EUC-WS 2005. LNCS, vol. 3823, pp. 1088–1097. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  12. Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies. INFOCOM 2004, March 7-11, 2004, vol. 1, pp. 586–597 (2004)

    Google Scholar 

  13. Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  14. Blundo, C., Santis, A.D., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)

    Google Scholar 

  15. Zarowski, C.J.: An Introduction to Numerical Analysis for Electrical and Computer Engineers. John Wiley & Sons, Hoboken (2004)

    Book  MATH  Google Scholar 

  16. Nakos, G., Joyner, D.: Linear Algebra with Applications, pp. 188–194. Brooks/Cole, USA (1998)

    Google Scholar 

  17. Birkhauser, Linear Algebra, Birkhauser Boston, pp. 33–37 (1997)

    Google Scholar 

  18. Douceur, J.: The Sybil Attack. In: 1st International Workshop on Peer-to-Peer Systems (2002)

    Google Scholar 

  19. Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: Proc. of the third international symposium on Information processing in sensor networks, pp. 259–268. ACM, New York (2004)

    Chapter  Google Scholar 

  20. Menezes, A., Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pathan, AS.K., Dai, T.T., Hong, C.S. (2006). A Key Management Scheme with Encoding and Improved Security for Wireless Sensor Networks. In: Madria, S.K., Claypool, K.T., Kannan, R., Uppuluri, P., Gore, M.M. (eds) Distributed Computing and Internet Technology. ICDCIT 2006. Lecture Notes in Computer Science, vol 4317. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11951957_10

Download citation

  • DOI: https://doi.org/10.1007/11951957_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-68379-7

  • Online ISBN: 978-3-540-68380-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics