Skip to main content

An Improved Distributed Key Management Scheme in Wireless Sensor Networks

  • Conference paper
Information Security Applications (WISA 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5379))

Included in the following conference series:

Abstract

A distributed key management scheme and the robust continuity of group key establishment are realized in this paper. This scheme derives the concept of seed members who are responsible for the management of users’ joining and revocation operations by using secret sharing techniques and Modified Blom’s symmetric key establishment mechanism. Besides, a novel seed member alternation mechanism which can efficiently resist of node capture attacks and revocation attacks leaves the resources much more balanced among the sensor nodes to prolong the lifetime of WSNs. Finally, The key continuity enables all the sensors to establish and update both of the pair-wise key and group key with the same key pre-distribution information, which significantly decreases the resource consuming of key management in distributed sensor networks. By comparison, this scheme outperforms most of the existing schemes in terms of network security, key connectivity and complexity of storage as well as communication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Communications Magazine 8, 393–422 (2002)

    Google Scholar 

  2. Zhong, S., Chuang, L., Fujun, F., Fengyuan, R.: Key Management Schemes and Protocols for Wireless Sensor Networks. Journal of Software 18, 1218–1231 (2007)

    Article  MATH  Google Scholar 

  3. Mi, W., Kefei, C., Yan-fei, Z., Hui, L.: A Reliable Pairwise Key-Updating Scheme for Sensor Networks. Journal of Software 18, 1232–1245 (2007)

    Article  MATH  Google Scholar 

  4. Chan, H., Gligor, V.D., Perrig, A., Muralidharan, G.: On the Distribution and Revocation of Cryptographic Keys in Sensor Networks. IEEE Transanctions on Dependable and Secure Computing 2, 233–247 (2005)

    Article  Google Scholar 

  5. Blom, R.: An Optimal Class of Symmetric Key Generation Systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  6. Eschenauer, L., Gligor, V.: A key management scheme for distributed sensor networks. In: Proc. of the 9th ACM Conf. on Computer and Communications Security, pp. 41–47. ACM Press, New York (2002)

    Google Scholar 

  7. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proc. of the 10th ACM Conf. on Computer and Communications Security, pp. 42–51. ACM Press, New York (2003)

    Google Scholar 

  8. Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proc. of the 10th ACM Conf. on Computer and Communications Security, pp. 52–61. ACM Press, New York (2003)

    Google Scholar 

  9. Liu, D., Ning, P.: Location-Based pairwise key establishments for static sensor networks. In: Proc. of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 72–82. ACM Press, New York (2003)

    Chapter  Google Scholar 

  10. Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: Proc. of the IEEE INFOCOM, pp. 586–597. IEEE Press, Piscataway (2004)

    Google Scholar 

  11. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, pp. 197–213 (2003)

    Google Scholar 

  12. Camtepe, S.A., Yener, B.: Key distribution mechanisms for wireless sensor networks: A Survey. Technical Report, TR-05-07, Rensselaer Polytechnic Institute (2005)

    Google Scholar 

  13. Burmester, M., Desmedt, Y.: A secure and scalable group key exchange system. Information Processing Letters 94, 137–143 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  14. Raazi, S.M.K., Khan, A.M., Khan, F.I., Lee, S.Y., Song, Y.J., Lee, Y.K.: MUQAMI: A locally distributed key management scheme for clustered sensor networks. IFIP International Federation for Information Processing 238, 333–348 (2007)

    Article  Google Scholar 

  15. Das, A.K., Sengupta, I.: A key establishment scheme for large-scale mobile wireless sensor networks. In: Janowski, T., Mohanty, H. (eds.) ICDCIT 2007. LNCS, vol. 4882, pp. 79–88. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhou, J., He, M. (2009). An Improved Distributed Key Management Scheme in Wireless Sensor Networks. In: Chung, KI., Sohn, K., Yung, M. (eds) Information Security Applications. WISA 2008. Lecture Notes in Computer Science, vol 5379. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-00306-6_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-00306-6_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-00305-9

  • Online ISBN: 978-3-642-00306-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics