Abstract
It is commonly agreed that Wireless Sensor Networks (WSN) is one of the technologies that better fulfills features like the ones required by Critical (Information) Infrastructures. However, a sensor network is highly vulnerable against any external or internal attacks, thus network designers must know which are the tools that they can use in order to avoid such problems. In this paper we describe in detail a procedure (the KMS Guidelines), developed under our CRISIS project, that allows network designers to choose a certain Key Management System, or at least to know which protocol need to improve in order to satisfy the network requirements.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Commission of the European Communities. Communication from the Commission to the Council and the European Parliament: Critical Infrastructure Protection in the Fight Against Terrorism, COM (2004) 702 final, Brussels, October 20 (2004)
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks: The International Journal of Computer and Telecommunications Networking 38(4), 393–422 (2002)
2004 US National Plan for Research and Development in Support for CIP, April 8 (2005), retrieved from: http://www.dhs.gov/interweb/assetlibrary/ST_2004_NCIP_RD_PlanFINALApr05.pdf
Bopping, D.: CIIP in Australia. In: 1st CI2RCO Critical Information Infrastructure Protection conference, Rome (March 2006)
Crossbow Technology, Inc. Wireless Measurement Systems, http://www.xbow.com
Lopez, J., Montenegro, J.A., Roman, R.: Service-Oriented Security Architecture for CII based on Sensor Networks. In: 2nd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), Lyon (France) (June 2006)
Camtepe, A., Yener, B.: Key distribution mechanisms for wireless sensor networks: a survey. Rensselaer Polytechnic Institute, Computer Science Department, Tech. Rep. 05-07 (March 2005)
Karlof, C., Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. In: Proceedings of 2nd International Conference on Embedded Networked Sensor Systems (SensSys 2004) (November 2004)
Moteiv Corporation, http://www.moteiv.com
Smart Infrastructure. The Cambridge-MIT Institute, http://www.cambridge-mit.org/smartinfrastructure
Sensor Nets RFID. Intel Corporation, http://www.intel.com/research/exploratory/wireless_sensors.htm
Distributed Intelligence, Sensing and Coordination in Variable Environments. CSIRO, http://www.ict.csiro.au/page.php?cid=97
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and communications security (CCS 2002), pp. 41–47. ACM Press, New York (2002)
Du, W., Deng, J., Han, Y.S., Varshney, P.: A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge. IEEE Transactions on Dependable and Secure Computing 3(2), 62–77 (2006)
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM conference on Computer and communications security (CCS 2003), pp. 42–51. ACM Press, New York (2003)
Pietro, R.D., Mancini, L.V., Mei, A.: Random key-assignment for secure Wireless Sensor Networks. In: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (SASN 2003), pp. 62–71. ACM Press, New York (2003)
Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: 2003 IEEE Symposium on Security and Privacy, May 2003, pp. 197–213 (2003)
Lee, J., Stinson, D.R.: Deterministic Key Predistribution Schemes for Distributed Networks. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 294–307. Springer, Heidelberg (2004)
Liu, D., Ning, P., Li, R.: Establishing Pairwise Keys in Distributed Sensor Networks. ACM Transactions on Information and System Security 8(1), 41–77 (2005)
Anderson, R.J., Chan, H., Perrig, A.: Key Infection: Smart Trust for Smart Dust. In: Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004), October 2004, pp. 206–215 (2004)
Liu, D., Ning, P.: Improving Key Pre-Distribution with Deployment Knowledge in Static Sensor Networks. ACM Transactions on Sensor Networks (TOSN) 1(2), 204–239 (2005)
Camtepe, A., Yener, B.: Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 293–308. Springer, Heidelberg (2004)
Hwang, D.D., Charles Lai, B., Verbauwhede, I.: Energy-Memory-Security Tradeoffs in Distributed Sensor Networks. In: Nikolaidis, I., Barbeau, M., Kranakis, E. (eds.) ADHOC-NOW 2004. LNCS, vol. 3158. Springer, Heidelberg (2004)
Hwang, J., Kim, Y.: Revisiting Random Key Pre-distribution Schemes for Wireless Sensor Networks. In: Proceedings of the 2nd ACM workshop on Security of Ad Hoc and Sensor Networks (SASN 2004), pp. 43–52. ACM Press, New York (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Alcaraz, C., Roman, R. (2006). Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios. In: Lopez, J. (eds) Critical Information Infrastructures Security. CRITIS 2006. Lecture Notes in Computer Science, vol 4347. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11962977_14
Download citation
DOI: https://doi.org/10.1007/11962977_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-69083-2
Online ISBN: 978-3-540-69084-9
eBook Packages: Computer ScienceComputer Science (R0)