Abstract
The establishment of shared keys between communicating neighbor nodes in wireless sensor networks is a challenge due to resource-constrained sensor networks. Several key pre-distribution schemes have been proposed in literatures to establish pairwise keys between sensor nodes. However, many of them are either too complicated to fit for wireless sensor networks or insecure for some common aggressions. In this paper, we propose a random key management scheme based on random key pre-distribution for wireless sensor networks. To achieve better performance and security, the proposed scheme employs two different phases to establish enhanced pairwise keys between neighboring nodes. Compared with other existing random key pre-distribution schemes, our scheme has better resilience against node capture and also performs better in terms of network connectivity and scalability with appropriate memory, computation and communication overheads.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Anderson, R.J., Chan, H., Perrig, A.: Key Infection: Smart Trust for Smart Dust. In: Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP), pp. 206–215 (2004)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of the 24th IEEE Symposium on Security and Privacy, pp. 197–215 (2003)
Du, W., Deng, J., Han, Y.S., Varshney, P.: A pairwise key predistribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (2003)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS) (2002)
Estrin, D., Girod, L., Pottie, G., Srivastava, M.: Instrumenting the World with Wireless Sensor Networks. In: Proceedings of the 1st IEEE international Conference on Acoustics, Speech, and Signal Processing (ICASSP) (2001)
Fang, L., Jose, R., Xiuzhen, C.: Location-aware Key Establishment in Wireless Sensor Networks. In: Proceedings of the International Conference on Communications and Mobile Computing, Computer and Network Security Symposium (IWCMC), pp. 21–26 (2006)
Gura, N., Patel, A., Arvinderpal, W., Eberle, H., Sheueling, C.S.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In: Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES) (2004)
Liu, D., Ning, P.: Location-based pairwise key establishments for relatively static Sensor networks. In: Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN) (2003)
Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS) (2003)
Pietro, R., Mancini, L., Mei, A.: Random key assignment secure wireless sensor networks. In: Proceedings of the 1st ACM workshop on Security of Ad Hoc and Sensor Networks (2003)
Wander, A.S., Gura, N., Eberle, H., Gupta, V., Shantz, S.C.: Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks. In: Proceedings of the 3rd IEEE international Conference on International Pervasive Computing and Communications (PerCom), pp. 324–328 (2005)
Yuksel, K., Kaps, J.P., Sunar, B.: Universal hash functions for emerging ultra-low-power networks. In: The Communications Networks and Distributed Systems Modeling and Simulation Conference (WMC) (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yang, Q., Li, Q., Wang, X., Xiong, N., Pan, Y. (2008). A Random Key Management Scheme for Wireless Sensor Networks. In: Li, Y., Huynh, D.T., Das, S.K., Du, DZ. (eds) Wireless Algorithms, Systems, and Applications. WASA 2008. Lecture Notes in Computer Science, vol 5258. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88582-5_45
Download citation
DOI: https://doi.org/10.1007/978-3-540-88582-5_45
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-88581-8
Online ISBN: 978-3-540-88582-5
eBook Packages: Computer ScienceComputer Science (R0)