Skip to main content

Key Predistribution Schemes Using Codes in Wireless Sensor Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5487))

Abstract

In this paper we propose novel deterministic key predistribution schemes using codes. In particular we use Reed Solomon codes to present key predistribution scheme, which is better than existing schemes in terms of connectivity. We show that selective node compromise attack cannot be launched, because there is no clever way of knowing which nodes to compromise. An important advantage of our scheme is that we can increase the scalability of the network without redistributing keys in the existing nodes.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Al-Shurman, M., Yoo, S.-M.: Key pre-distribution using mds codes in mobile ad hoc networks. In: ITNG, pp. 566–567. IEEE Computer Society Press, Los Alamitos (2006)

    Google Scholar 

  2. Blackburn, S.R., Etzion, T., Martin, K.M., Paterson, M.B.: Efficient key predistribution for grid-based wireless sensor networks. In: Safavi-Naini, R. (ed.) ICITS 2008. LNCS, vol. 5155, pp. 54–69. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  3. Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  4. Çamtepe, S.A., Yener, B.: Key distribution mechanisms for wireless sensor networks: A survey, 2005. Technical Report TR-05-07 Rensselaer Polytechnic Institute,Computer Science Department (March 2005)

    Google Scholar 

  5. Çamtepe, S.A., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 293–308. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Chan, H., Perrig, A., Song, D.X.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, p. 197. IEEE Computer Society, Los Alamitos (2003)

    Google Scholar 

  7. Dong, J., Pei, D., Wang, X.: A key predistribution scheme based on 3-designs. In: Pei, D., Yung, M., Lin, D., Wu, C. (eds.) INSCRYPT 2007. LNCS, vol. 4990, pp. 81–92. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  8. Dong, J., Pei, D., Wang, X.: A class of key predistribution schemes based on orthogonal arrays. In: JCST (2008)

    Google Scholar 

  9. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A key predistribution scheme for sensor networks using deployment knowledge. IEEE Trans. Dependable Sec. Comput. 3(1), 62–77 (2006)

    Article  Google Scholar 

  10. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Atluri, V. (ed.) ACM Conference on Computer and Communications Security, pp. 41–47. ACM, New York (2002)

    Google Scholar 

  11. Lee, J.-Y., Stinson, D.R.: Deterministic key predistribution schemes for distributed sensor networks. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 294–307. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  12. Lee, J., Stinson, D.R.: A combinatorial approach to key predistribution for distributed sensor networks. In: IEEE Wireless Communications and Networking Conference, WCNC 2005, New Orleans, LA, USA (2005)

    Google Scholar 

  13. Lee, J., Stinson, D.R.: On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs. ACM Trans. Inf. Syst. Secur. 11(2) (2008)

    Google Scholar 

  14. Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Jajodia, S., Atluri, V., Jaeger, T. (eds.) ACM Conference on Computer and Communications Security, pp. 52–61. ACM, New York (2003)

    Google Scholar 

  15. Di Pietro, R., Mancini, L.V., Mei, A.: Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Wireless Networks 12(6), 709–721 (2006)

    Article  Google Scholar 

  16. Ruj, S., Roy, B.: Key establishment algorithms for some deterministic key predistribution schemes. In: Rodrguez, A., Yage, M., Fernndez-Medina, E. (eds.) Workshop on Security In Information Systems, INSTICC (2008)

    Google Scholar 

  17. Ruj, S., Roy, B.: Key predistribution using partially balanced designs in wireless sensor networks. In: Stojmenovic, I., Thulasiram, R.K., Yang, L.T., Jia, W., Guo, M., de Mello, R.F. (eds.) ISPA 2007. LNCS, vol. 4742, pp. 431–445. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  18. Stinson, D.R.: Combinatorial Designs: Construction and Analysis. Springer, New York (2004)

    MATH  Google Scholar 

  19. Sudan, M.: Algorithmic introduction to coding theory lecture 4 (2001) (last Accessed November 2, 2008), http://people.csail.mit.edu/madhu/FT01/scribe/lect4.ps

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ruj, S., Roy, B. (2009). Key Predistribution Schemes Using Codes in Wireless Sensor Networks. In: Yung, M., Liu, P., Lin, D. (eds) Information Security and Cryptology. Inscrypt 2008. Lecture Notes in Computer Science, vol 5487. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-01440-6_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-01440-6_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-01439-0

  • Online ISBN: 978-3-642-01440-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics