Abstract
Mobile Sensor Network (MSN) imposes challenges to apply security schemes for mobility and free joining and leaving in the network. Key pre-distribution scheme used for Wireless Sensor Network (WSN) is a potential candidate applicable to MSN as it is a brach of WSN with some additional features. In this paper, we evaluate the feasibilty of a key predistribution scheme named Randomized Grid Based (RGB) scheme proposed for WSN in the context of MSN. We propose a key revocation scheme applying redundancy on RGB scheme to ensure best connectivity and resiliency. The analysis proves the effectiveness of the scheme in terms of connectivity and resiliency.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Blundo, C., Santis, A.D., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-Secure Key Distribution for Dynamic Conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)
Brutch, P., Ko, C.: Challenges in Intrusion Detection for Wireless Ad-hoc Networks. In: Proc. of the 2003 Sym. on Applications and the Internet Workshops, pp. 368–373. IEEE Computer Society Press, Los Alamitos (2003)
Carman, D.W., Kruus, P.S., Matt, B.J.: Constraints and Approaches for Distributed Sensor Network Security. NAI Labs Technical Report #00-010 (2000)
Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: Proc. of IEEE Sym. on Research in Security and Privacy, pp. 197–213. IEEE Computer Society, Los Alamitos (2003)
Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A Pairwise key Predistribution Scheme for Wireless Sensor Networks. In: Proc. of the 10th ACM Conf. on Computer and Communications Security, pp. 42–51 (2003)
Erdos, P., Renyi, A.: On random graphs. I. Publ. Math. Debrecen 6, 290–297 (1959)
Eschenauer, L., Gligor, V.D.: A Key-Management Scheme for Distributed Sensor Networks. In: Proc. of the 9th ACM Conf. on Computer and Communications Security, pp. 41–47. ACM Press, New York (2002)
Ganeriwal, S., Srivastava, M.B.: Reputation-based Framework for High Integrity Sensor Networks. In: Proc. of the 2nd ACM workshop on Security of Ad-Hoc and Sensor Networks, pp. 66–77. ACM Press, New York (2004)
Nadkarni, K., Mishra, A.: A Novel Intrusion Detection Approach for Wireless Ad hoc Networks. In: Proc. of the IEEE Wireless Communications and Networking Conf., vol. 2, pp. 831–836. IEEE Computer Society, Los Alamitos (2004)
Nesome, J., Shi, E., Song, D., Perrig, A.: The Sybil Attack in Sensor Networks: Analysis & Defenses. In: Proc. of IEEE Int. Conf. on Information Processing in Sensor Networks, pp. 259–268. IEEE Computer Society Press, Los Alamitos (2004)
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: security protocols for sensor netowrks. In: Proc. of the 7th Annual ACM/IEEE Int. Conf. on Mobile Computing and Networking, pp. 189–199. IEEE Computer Society Press, Los Alamitos (2001)
Sadi, M.G., Park, J., Kim, D.: Randomized Grid Based Scheme for Wireless Sensor Network. In: Wang, J., Liao, X.-F., Yi, Z. (eds.) ISNN 2005. LNCS, vol. 3498, pp. 415–420. Springer, Heidelberg (2005)
Sanchez, D., Baldus, H.: Key Management for Mobile Sensor Networks. In: Burmester, M., Yasinsac, A. (eds.) MADNES 2005. LNCS, vol. 4074, pp. 14–26. Springer, Heidelberg (2006)
Stallings, W.: Cryptography and Network Security: Principles and Practice, 2nd edn. Prentice-Hall, Englewood Cliffs (1999)
Watkins, D., Scott, C.: Methodology for evaluating the effectiveness of intrusion detection in tactical mobile ad-hoc networks. Proc. of IEEE Wireless Communications and Networking Conferences 1, 622–627 (2004)
Zhang, Y., Lee, W.: Intrusion detection in Wireless Ad-Hoc Networks. In: Proc. of The 6th Int. Conf. on Mobile Computing and Networking, pp. 275–283 (2000)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, D.S., Sadi, M.G., Park, J.S. (2007). A Key Revocation Scheme for Mobile Sensor Networks. In: Thulasiraman, P., He, X., Xu, T.L., Denko, M.K., Thulasiram, R.K., Yang, L.T. (eds) Frontiers of High Performance Computing and Networking ISPA 2007 Workshops. ISPA 2007. Lecture Notes in Computer Science, vol 4743. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74767-3_5
Download citation
DOI: https://doi.org/10.1007/978-3-540-74767-3_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74766-6
Online ISBN: 978-3-540-74767-3
eBook Packages: Computer ScienceComputer Science (R0)