Skip to main content

A Key Management Based on Multiple Regression in Hierarchical Sensor Network

  • Conference paper
  • 488 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4298))

Abstract

To lead a present communication paradigm to ubiquitous world, sensor networking is a core technology. Especially guaranteeing secure communication between sensor nodes is critical in hostile environments, and key management is one of the most fundamental security services to achieve it. However, because the structure of sensor networks can be very various according to their application, there can not exist the best solution for all applications. Thus, we design a key management scheme on hierarchical sensor network, to take advantage of the topology. To support both scalability and resilience against node capture, we apply a multiple regression model to key generation, calculation and extension. The proposed scheme is based on the key pre-distribution, but provides the key re-distribution method for key freshness. To overcome the weakness of centralized management, the role of key management is partially distributed to aggregators as well as a sink. These management nodes need not store keys except them for re-distribution, and can calculate them easily using key information from nodes, as needed. Performance results show that the proposed scheme can be applied efficiently in hierarchical sensor network compared with other key managements.

This research was supported by the MIC, Korea, under the ITRC support program supervised by the IITA.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. In: MobiCom 2001, pp. 189–199 (2001)

    Google Scholar 

  2. Avancha, S., Undercoffer, J., Joshi, A., Pinkston, J.: Secure sensor networks for perimeter protection. International Journal of Computer and Telecommunications Networking 43(4), 421–435 (2003)

    MATH  Google Scholar 

  3. Du, W., Deng, J., Han, Y.S., Varshney, P.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In: 10th ACM Conference on Computer and Communications Security, pp. 42–51. ACM Press, New York (2003)

    Chapter  Google Scholar 

  4. Liu, D., Ning, P.: Establishing Pairwise Keys in Distributed Sensor Networks. In: CCS’03, pp. 52–61 (2003)

    Google Scholar 

  5. Chen, X., Drissi, J.: An Efficient Key Management Scheme in Hierarchical Sensor Networks. In: MASS 2005 (2005)

    Google Scholar 

  6. Tubaishat, M., Yin, J., Panja, B., Madria, S.: A Secure Hierarchical Model for Sensor Networ. SIGMOD Record 33(1), 7–13 (2004)

    Article  Google Scholar 

  7. Golberg, M.A.: Introduction to Regression Analysis. WIT Press, Southampton (2004)

    MATH  Google Scholar 

  8. Richard, J.D., Mishra, S.: Security Support for In-Network Processing in Wireless Sensor Networks. In: ACM Workshop on the Security of Ad hoc and Sensor Network, pp. 83–93. ACM Press, New York (2003)

    Google Scholar 

  9. Bohge, M., Trappe, W.: An Authentication Framework for Hierarchical Ad-hoc Sensor Networks. In: ACM Workshop on Wireless Security, ACM Press, New York (2003)

    Google Scholar 

  10. Hou, Y.T., Shi, Y., Sherali, H.D.: Rate Allocation in Wireless Sensor Networks with Network Lifetime Requirement. In: MobiHoc, pp. 67–77 (2004)

    Google Scholar 

  11. Ye, F., Luo, H., Cheng, J., Lu, S., Zhang, L.: A Two-tier Data Dissemination Model for Large-scale Wireless Sensor Networks. In: ACM/IEEE Mobicom, IEEE Computer Society Press, Los Alamitos (2002)

    Google Scholar 

  12. Intanagonwiwat, C., Govindan, R., Estrin, D., Heidemann, J., Silva, F.: Directed Diffusion for Wireless Sensor Networking. ACM/IEEE Transactions on Networking, 2–16 (2002)

    Google Scholar 

  13. Ding, J., Sivalingam, K., Li, B.: Design and Analysis of an Integrated MAC and Routing Protocol Framework for Wireless Sensor Networks. Int. Journal on Ad Hoc & Sensor Wireless Networks (2005)

    Google Scholar 

  14. MICA2 Series (MPR4x0), http://www.xbow.com/Products/productsdetails.aspx?sid=72

  15. TinyOS Tutorial, http://www.tinyos.net/tinyos-1.x/doc/tutorial/

  16. Karlof, C., Sastry, N., Wagner, D.: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In: SenSys04’, Nov. (2004)

    Google Scholar 

  17. Shnayder, V., Hempstead, M., Chen, B., Welsh, M.: Simulating the Power Consumption of LargeScale Sensor Network Applications. In: SenSys 04’, Nov. (2004)

    Google Scholar 

  18. Chan, H., Perrig, A.: PIKE: Peer Intermediaries for Key Establishment. In: INFOCOM 2005 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jae Kwang Lee Okyeon Yi Moti Yung

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Kim, M., Doh, I., Chae, K. (2007). A Key Management Based on Multiple Regression in Hierarchical Sensor Network. In: Lee, J.K., Yi, O., Yung, M. (eds) Information Security Applications. WISA 2006. Lecture Notes in Computer Science, vol 4298. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71093-6_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-71093-6_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-71092-9

  • Online ISBN: 978-3-540-71093-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics