Skip to main content

A Random Key Management Scheme for Wireless Sensor Networks

  • Conference paper
  • 1160 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5258))

Abstract

The establishment of shared keys between communicating neighbor nodes in wireless sensor networks is a challenge due to resource-constrained sensor networks. Several key pre-distribution schemes have been proposed in literatures to establish pairwise keys between sensor nodes. However, many of them are either too complicated to fit for wireless sensor networks or insecure for some common aggressions. In this paper, we propose a random key management scheme based on random key pre-distribution for wireless sensor networks. To achieve better performance and security, the proposed scheme employs two different phases to establish enhanced pairwise keys between neighboring nodes. Compared with other existing random key pre-distribution schemes, our scheme has better resilience against node capture and also performs better in terms of network connectivity and scalability with appropriate memory, computation and communication overheads.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R.J., Chan, H., Perrig, A.: Key Infection: Smart Trust for Smart Dust. In: Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP), pp. 206–215 (2004)

    Google Scholar 

  2. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of the 24th IEEE Symposium on Security and Privacy, pp. 197–215 (2003)

    Google Scholar 

  3. Du, W., Deng, J., Han, Y.S., Varshney, P.: A pairwise key predistribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (2003)

    Google Scholar 

  4. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS) (2002)

    Google Scholar 

  5. Estrin, D., Girod, L., Pottie, G., Srivastava, M.: Instrumenting the World with Wireless Sensor Networks. In: Proceedings of the 1st IEEE international Conference on Acoustics, Speech, and Signal Processing (ICASSP) (2001)

    Google Scholar 

  6. Fang, L., Jose, R., Xiuzhen, C.: Location-aware Key Establishment in Wireless Sensor Networks. In: Proceedings of the International Conference on Communications and Mobile Computing, Computer and Network Security Symposium (IWCMC), pp. 21–26 (2006)

    Google Scholar 

  7. Gura, N., Patel, A., Arvinderpal, W., Eberle, H., Sheueling, C.S.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In: Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES) (2004)

    Google Scholar 

  8. Liu, D., Ning, P.: Location-based pairwise key establishments for relatively static Sensor networks. In: Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN) (2003)

    Google Scholar 

  9. Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS) (2003)

    Google Scholar 

  10. Pietro, R., Mancini, L., Mei, A.: Random key assignment secure wireless sensor networks. In: Proceedings of the 1st ACM workshop on Security of Ad Hoc and Sensor Networks (2003)

    Google Scholar 

  11. Wander, A.S., Gura, N., Eberle, H., Gupta, V., Shantz, S.C.: Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks. In: Proceedings of the 3rd IEEE international Conference on International Pervasive Computing and Communications (PerCom), pp. 324–328 (2005)

    Google Scholar 

  12. Yuksel, K., Kaps, J.P., Sunar, B.: Universal hash functions for emerging ultra-low-power networks. In: The Communications Networks and Distributed Systems Modeling and Simulation Conference (WMC) (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yang, Q., Li, Q., Wang, X., Xiong, N., Pan, Y. (2008). A Random Key Management Scheme for Wireless Sensor Networks. In: Li, Y., Huynh, D.T., Das, S.K., Du, DZ. (eds) Wireless Algorithms, Systems, and Applications. WASA 2008. Lecture Notes in Computer Science, vol 5258. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88582-5_45

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-88582-5_45

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-88581-8

  • Online ISBN: 978-3-540-88582-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics