Abstract
Wireless sensor networks are emerging as a promising solution for various types of futuristic applications both for military and public. Security in wireless sensor networks is very crucial as these networks are expected mainly to operate in the hazardous and hostile environments. Efficient key management could guarantee authenticity and confidentiality of the data exchanged among the nodes in the network. In this paper, we propose an improved and efficient key pre-distribution scheme for wireless sensor networks. Our scheme significantly increases the storage efficiency and security than that of the previously proposed scheme based on LU decomposition. It also ensures node-to-node mutual authentication in a way that an eavesdropper cannot harm the network by monitoring the traffic flows in the network. We also present detailed performance analysis and compare our scheme with the existing schemes.
This work was supported by MIC and ITRC projects. Dr. C.S. Hong is the Corresponding Author.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s Ad Hoc Network Journal, Special Issue on Sensor Network Applications and Protocols, 293–315 (September 2003)
Pathan, A.-S.K., Lee, H.-W., Hong, C.S.: Security in Wireless Sensor Networks: Issues and Challenges. In: Proceedings of the 8th IEEE ICACT 2006, Phoenix Park, Korea, February 20-22, 2006, vol. II, pp. 1043–1048 (2006)
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. Wireless Networks 8(5), 521–534 (2002)
Jolly, G., Kuscu, M.C., Kokate, P., Younis, M.: A Low-Energy Key Management Protocol for Wireless Sensor Networks. In: Proc. Eighth IEEE ISCC 2003, vol. 1, pp. 335–340 (2003)
Rabaey, J.M., Ammer, J., Karalar, T., Li, S., Otis, B., Sheets, M., Tuan, T.: PicoRadios for wireless sensor networks: the next challenge in ultra-low power design. In: IEEE ISSCC 2002, February 3-7, 2002, vol. 1, pp. 200–201 (2002)
Hollar, S.: COTS Dust. Master’s Thesis, Electrical Engineering and Computer Science Department, UC Berkeley (2000)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proc. 2003 IEEE Symposium on Security and Privacy, May 11-14, 2003, pp. 197–213 (2003)
Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A Pairwise Key Predistribution Scheme for Wireless Sensor Networks. ACM Transactions on Information and System Security 8(2), 228–258 (2005)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and Communications, Washington, DC, USA, November 18-22, 2002, pp. 41–47 (2002)
Liu, D., Ning, P., Li, R.: Establishing Pairwise Keys in Distributed Sensor Networks. ACM Transactions on Information and System Security 8(1), 41–77 (2005)
Choi, S., Youn, H.: An Efficient Key Pre-distribution Scheme for Secure Distributed Sensor Networks. In: Enokido, T., Yan, L., Xiao, B., Kim, D.Y., Dai, Y.-S., Yang, L.T. (eds.) EUC-WS 2005. LNCS, vol. 3823, pp. 1088–1097. Springer, Heidelberg (2005)
Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies. INFOCOM 2004, March 7-11, 2004, vol. 1, pp. 586–597 (2004)
Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)
Blundo, C., Santis, A.D., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)
Zarowski, C.J.: An Introduction to Numerical Analysis for Electrical and Computer Engineers. John Wiley & Sons, Hoboken (2004)
Nakos, G., Joyner, D.: Linear Algebra with Applications, pp. 188–194. Brooks/Cole, USA (1998)
Birkhauser, Linear Algebra, Birkhauser Boston, pp. 33–37 (1997)
Douceur, J.: The Sybil Attack. In: 1st International Workshop on Peer-to-Peer Systems (2002)
Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: Proc. of the third international symposium on Information processing in sensor networks, pp. 259–268. ACM, New York (2004)
Menezes, A., Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pathan, AS.K., Dai, T.T., Hong, C.S. (2006). A Key Management Scheme with Encoding and Improved Security for Wireless Sensor Networks. In: Madria, S.K., Claypool, K.T., Kannan, R., Uppuluri, P., Gore, M.M. (eds) Distributed Computing and Internet Technology. ICDCIT 2006. Lecture Notes in Computer Science, vol 4317. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11951957_10
Download citation
DOI: https://doi.org/10.1007/11951957_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-68379-7
Online ISBN: 978-3-540-68380-3
eBook Packages: Computer ScienceComputer Science (R0)