Abstract
To lead a present communication paradigm to ubiquitous world, sensor networking is a core technology. Especially guaranteeing secure communication between sensor nodes is critical in hostile environments, and key management is one of the most fundamental security services to achieve it. However, because the structure of sensor networks can be very various according to their application, there can not exist the best solution for all applications. Thus, we design a key management scheme on hierarchical sensor network, to take advantage of the topology. To support both scalability and resilience against node capture, we apply a multiple regression model to key generation, calculation and extension. The proposed scheme is based on the key pre-distribution, but provides the key re-distribution method for key freshness. To overcome the weakness of centralized management, the role of key management is partially distributed to aggregators as well as a sink. These management nodes need not store keys except them for re-distribution, and can calculate them easily using key information from nodes, as needed. Performance results show that the proposed scheme can be applied efficiently in hierarchical sensor network compared with other key managements.
This research was supported by the MIC, Korea, under the ITRC support program supervised by the IITA.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. In: MobiCom 2001, pp. 189–199 (2001)
Avancha, S., Undercoffer, J., Joshi, A., Pinkston, J.: Secure sensor networks for perimeter protection. International Journal of Computer and Telecommunications Networking 43(4), 421–435 (2003)
Du, W., Deng, J., Han, Y.S., Varshney, P.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In: 10th ACM Conference on Computer and Communications Security, pp. 42–51. ACM Press, New York (2003)
Liu, D., Ning, P.: Establishing Pairwise Keys in Distributed Sensor Networks. In: CCS’03, pp. 52–61 (2003)
Chen, X., Drissi, J.: An Efficient Key Management Scheme in Hierarchical Sensor Networks. In: MASS 2005 (2005)
Tubaishat, M., Yin, J., Panja, B., Madria, S.: A Secure Hierarchical Model for Sensor Networ. SIGMOD Record 33(1), 7–13 (2004)
Golberg, M.A.: Introduction to Regression Analysis. WIT Press, Southampton (2004)
Richard, J.D., Mishra, S.: Security Support for In-Network Processing in Wireless Sensor Networks. In: ACM Workshop on the Security of Ad hoc and Sensor Network, pp. 83–93. ACM Press, New York (2003)
Bohge, M., Trappe, W.: An Authentication Framework for Hierarchical Ad-hoc Sensor Networks. In: ACM Workshop on Wireless Security, ACM Press, New York (2003)
Hou, Y.T., Shi, Y., Sherali, H.D.: Rate Allocation in Wireless Sensor Networks with Network Lifetime Requirement. In: MobiHoc, pp. 67–77 (2004)
Ye, F., Luo, H., Cheng, J., Lu, S., Zhang, L.: A Two-tier Data Dissemination Model for Large-scale Wireless Sensor Networks. In: ACM/IEEE Mobicom, IEEE Computer Society Press, Los Alamitos (2002)
Intanagonwiwat, C., Govindan, R., Estrin, D., Heidemann, J., Silva, F.: Directed Diffusion for Wireless Sensor Networking. ACM/IEEE Transactions on Networking, 2–16 (2002)
Ding, J., Sivalingam, K., Li, B.: Design and Analysis of an Integrated MAC and Routing Protocol Framework for Wireless Sensor Networks. Int. Journal on Ad Hoc & Sensor Wireless Networks (2005)
MICA2 Series (MPR4x0), http://www.xbow.com/Products/productsdetails.aspx?sid=72
TinyOS Tutorial, http://www.tinyos.net/tinyos-1.x/doc/tutorial/
Karlof, C., Sastry, N., Wagner, D.: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In: SenSys04’, Nov. (2004)
Shnayder, V., Hempstead, M., Chen, B., Welsh, M.: Simulating the Power Consumption of LargeScale Sensor Network Applications. In: SenSys 04’, Nov. (2004)
Chan, H., Perrig, A.: PIKE: Peer Intermediaries for Key Establishment. In: INFOCOM 2005 (2005)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Kim, M., Doh, I., Chae, K. (2007). A Key Management Based on Multiple Regression in Hierarchical Sensor Network. In: Lee, J.K., Yi, O., Yung, M. (eds) Information Security Applications. WISA 2006. Lecture Notes in Computer Science, vol 4298. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71093-6_21
Download citation
DOI: https://doi.org/10.1007/978-3-540-71093-6_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-71092-9
Online ISBN: 978-3-540-71093-6
eBook Packages: Computer ScienceComputer Science (R0)