Skip to main content

Key Refreshing in Wireless Sensor Networks

  • Conference paper
Information Theoretic Security (ICITS 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5155))

Included in the following conference series:

Abstract

The problem of establishing symmetric keys in wireless sensor networks has been extensively studied, but other aspects of key management have received comparatively little attention. In this paper we consider the problem of refreshing keys that are shared among several nodes in a WSN, in order to provide forward security. We discuss several applications that lead to sensor networks with very different properties, and we propose key refreshing schemes that are useful in each of these environments, together with resynchronisation methods that allow nodes possessing different versions of a key to arrive at a common version.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bellare, M., Yee, B.: Forward-Security in Private-Key Cryptography. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 1–18. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  2. Blum, L., Blum, M., Shub, M.: A Simple Unpredictable Pseudo-random Number Generator. SIAM J. Comput. 15(2), 364–383 (1986)

    Article  MATH  MathSciNet  Google Scholar 

  3. Çamtepe, S.A., Yener, B.: Key Distribution Mechanisms for Wireless Sensor Networks: a Survey. Technical report, Rensselaer Polytechnic Inst. TR-05-07 (2005)

    Google Scholar 

  4. Eschenauer, L., Gligor, V.D.: A Key-Management Scheme for Distributed Sensor Networks. In: Atluri, V. (ed.) CCS 2002, pp. 41–47. ACM, New York (2002)

    Chapter  Google Scholar 

  5. Günter, C.G.: An Identity-Based Key-Exchange Protocol. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 29–37. Springer, Heidelberg (1990)

    Google Scholar 

  6. Klonowski, M., Kutyłowski, M., Ren, M., Rybarczyk, K.: Forward-Secure Key Evolution in Wireless Sensor Networks. In: Bao, F., Ling, S., Okamoto, T., Wang, H., Xing, C. (eds.) CANS 2007. LNCS, vol. 4856, pp. 102–120. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  7. Lee, J., Stinson, D.R.: On the Construction of Practical Key Predistribution Schemes for Distributed Sensor Networks Using Combinatorial Designs. ACM Trans. Inf. Syst. Secur. 11(2), 1–35 (2008)

    Article  Google Scholar 

  8. Martin, K.M., Paterson, M.B.: An Application-Oriented Framework for Wireless Sensor Network Key Establishment. In: WCAN, ENTCS (to appear, 2007)

    Google Scholar 

  9. Mauw, S., van Vessen, I., Bos, B.: Forward Secure Communication in Wireless Sensor Networks. In: Clark, J.A., Paige, R.F., Polack, F.A.C., Brooke, P.J. (eds.) SPC 2006. LNCS, vol. 3934, pp. 32–43. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  10. Peleg, D.: Time-Optimal Leader Election in General Networks. J. Parallel Distr. Com. 8, 96–99 (1990)

    Article  Google Scholar 

  11. Ren, M., Das, T.K., Zhou, J.: Diverging Keys in Wireless Sensor Networks. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 257–269. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  12. Römer, K., Blum, P., Meier, L.: Time Synchronization and Calibration in Wireless Sensor Networks. In: Stojmenovic, I. (ed.) Handbook of Sensor Networks: Algorithms and Architectures, pp. 199–237. Wiley and Sons, Chichester (2005)

    Google Scholar 

  13. Römer, K., Mattern, F.: The Design Space of Wireless Sensor Networks. Wirel. Commun. 11(6), 54–61 (2004)

    Article  Google Scholar 

  14. Xiao, Y., Rayi, V.K., Sun, B., Du, X., Hu, F., Galloway, M.: A Survey of Key Management Schemes in Wireless Sensor Networks. Comput. Commun. 30, 2314–2341 (2007)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Reihaneh Safavi-Naini

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Blackburn, S.R., Martin, K.M., Paterson, M.B., Stinson, D.R. (2008). Key Refreshing in Wireless Sensor Networks. In: Safavi-Naini, R. (eds) Information Theoretic Security. ICITS 2008. Lecture Notes in Computer Science, vol 5155. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85093-9_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-85093-9_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-85092-2

  • Online ISBN: 978-3-540-85093-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics