Abstract
In wireless sensor network (WSN) security is as important as performance and energy efficiency for many applications. Key pre-distribution is a good approach to solve the key agreement problem in the WSN. Based on the Key-Insulated Encryption, a new key pre-distribution scheme, KIE-WSN scheme, is proposed in this paper. The proposed scheme has two important security properties: semantically security and optimal KIE-(N-1, N) safety, which means that even if N-1 nodes are compromised, there are no security threatens to the left network. Compared with the existed schemes, the proposed KIE-WSN scheme has better performance in the storage and communication cost.
This work has been supported by National High Technology Research and Development project of China under Grant No. 2007AA01Z456 and NSFC under Grant 60703030.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Akyildiz, I.F., Su, W., Samkarasubramaniam, Y., Cayirci, E.: Wireless sensor network. A survey Computer Networks 40(8), 102–114 (2002)
Manges, W., Allgood, G., Smith, S.: It’s Time for Sensors to Go Wireless. Part 1: Technological Underpinnings. Sensors Magazine (April 1999)
Eschenauer, L., Gligor, V.D.: A key management scheme for distributed sensor networks. In: Proc. of the 9th ACM Conference on Computer and Communication Security, pp. 41–47. ACM Press, New York (2002)
Chan, H., Perrig, A., Song, D.: Random key pre-distribution schemes for sensor networks. In: Proc. of IEEE Symposium on Security and Privacy, pp. 197–213. IEEE Computer Society, Berkeley (2003)
Gaubatz, G., Kaps, J., Sunar, B.: Public keys cryptography in sensor networks-Revisited. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 2–18. Springer, Heidelberg (2005)
Malan, D.J., Welsh, M., Smith, M.D.: A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: Proc. of the 1st IEEE Int’l Conf. on Sensor and Ad-Hoc Communication and Networks, pp. 71–80. IEEE Press, Los Alamitos (2004)
Dodis, Y., Katz, J., Xu, S., et al.: Key-Insulated Public Key Cryptosystems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, p. 65. Springer, Heidelberg (2002)
Joux, A., Nguyen, K.: Separating Decision Diffie-Hellman from Diffiie-Hellman in cryptographic groups. Cryptology 16(4), 239–247 (2003)
Bellare, M., Palacio, A.: Protecting against key-exposure: Strongly key-insulated encryption with optimal threshold. In: AAECC, vol. 16, pp. 379–396 (2006)
Weng, J., Liu, S., Chen, K., Zheng, D., Qiu, W.: Identity-Based Threshold Key-Insulated Encryption without Random Oracles. In: Malkin, T.G. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 203–220. Springer, Heidelberg (2008)
Hanaoka, G., Hanaoka, Y., Imai, H.: Parallel Key-Insulated Public Key Encryption. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 105–122. Springer, Heidelberg (2006)
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. SIAM J. Comput. 32(3), 586–615 (2003); Preliminary version, Kilian, J. (ed.): CRYPTO 2001. LNCS, vol. 2139. Springer, Heidelberg (2001)
Mi, W.: Study on key technology for the security of wireless sensor network. Thesis, Shanghai Jiao Tong University (2008)
Du, W., Deng, J., Han, Y.S., et al.: A pair-wise key pre-distribution scheme for wireless sensor networks. In: Proc. of the 10th ACM conf, on Computer and Communications Security, pp. 42–51. ACM Press, New York (2003)
Choi, S.J., Youn, H.Y.: An efficient key pre-distribution scheme for secure distributed sensor networks. In: The 2005 IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2005), pp. 1088–1097. Springer, Nagasaki (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Qiu, W., Zhou, Y., Zhu, B., Zheng, Y., Wen, M., Gong, Z. (2009). Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN. In: Park, J.H., Chen, HH., Atiquzzaman, M., Lee, C., Kim, Th., Yeo, SS. (eds) Advances in Information Security and Assurance. ISA 2009. Lecture Notes in Computer Science, vol 5576. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02617-1_21
Download citation
DOI: https://doi.org/10.1007/978-3-642-02617-1_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02616-4
Online ISBN: 978-3-642-02617-1
eBook Packages: Computer ScienceComputer Science (R0)