Skip to main content

Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN

  • Conference paper
Advances in Information Security and Assurance (ISA 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5576))

Included in the following conference series:

Abstract

In wireless sensor network (WSN) security is as important as performance and energy efficiency for many applications. Key pre-distribution is a good approach to solve the key agreement problem in the WSN. Based on the Key-Insulated Encryption, a new key pre-distribution scheme, KIE-WSN scheme, is proposed in this paper. The proposed scheme has two important security properties: semantically security and optimal KIE-(N-1, N) safety, which means that even if N-1 nodes are compromised, there are no security threatens to the left network. Compared with the existed schemes, the proposed KIE-WSN scheme has better performance in the storage and communication cost.

This work has been supported by National High Technology Research and Development project of China under Grant No. 2007AA01Z456 and NSFC under Grant 60703030.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Su, W., Samkarasubramaniam, Y., Cayirci, E.: Wireless sensor network. A survey Computer Networks 40(8), 102–114 (2002)

    Google Scholar 

  2. Manges, W., Allgood, G., Smith, S.: It’s Time for Sensors to Go Wireless. Part 1: Technological Underpinnings. Sensors Magazine (April 1999)

    Google Scholar 

  3. Eschenauer, L., Gligor, V.D.: A key management scheme for distributed sensor networks. In: Proc. of the 9th ACM Conference on Computer and Communication Security, pp. 41–47. ACM Press, New York (2002)

    Google Scholar 

  4. Chan, H., Perrig, A., Song, D.: Random key pre-distribution schemes for sensor networks. In: Proc. of IEEE Symposium on Security and Privacy, pp. 197–213. IEEE Computer Society, Berkeley (2003)

    Google Scholar 

  5. Gaubatz, G., Kaps, J., Sunar, B.: Public keys cryptography in sensor networks-Revisited. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 2–18. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  6. Malan, D.J., Welsh, M., Smith, M.D.: A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: Proc. of the 1st IEEE Int’l Conf. on Sensor and Ad-Hoc Communication and Networks, pp. 71–80. IEEE Press, Los Alamitos (2004)

    Google Scholar 

  7. Dodis, Y., Katz, J., Xu, S., et al.: Key-Insulated Public Key Cryptosystems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, p. 65. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  8. Joux, A., Nguyen, K.: Separating Decision Diffie-Hellman from Diffiie-Hellman in cryptographic groups. Cryptology 16(4), 239–247 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  9. Bellare, M., Palacio, A.: Protecting against key-exposure: Strongly key-insulated encryption with optimal threshold. In: AAECC, vol. 16, pp. 379–396 (2006)

    Google Scholar 

  10. Weng, J., Liu, S., Chen, K., Zheng, D., Qiu, W.: Identity-Based Threshold Key-Insulated Encryption without Random Oracles. In: Malkin, T.G. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 203–220. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  11. Hanaoka, G., Hanaoka, Y., Imai, H.: Parallel Key-Insulated Public Key Encryption. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T.G. (eds.) PKC 2006. LNCS, vol. 3958, pp. 105–122. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  12. Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. SIAM J. Comput. 32(3), 586–615 (2003); Preliminary version, Kilian, J. (ed.): CRYPTO 2001. LNCS, vol. 2139. Springer, Heidelberg (2001)

    Google Scholar 

  13. Mi, W.: Study on key technology for the security of wireless sensor network. Thesis, Shanghai Jiao Tong University (2008)

    Google Scholar 

  14. Du, W., Deng, J., Han, Y.S., et al.: A pair-wise key pre-distribution scheme for wireless sensor networks. In: Proc. of the 10th ACM conf, on Computer and Communications Security, pp. 42–51. ACM Press, New York (2003)

    Google Scholar 

  15. Choi, S.J., Youn, H.Y.: An efficient key pre-distribution scheme for secure distributed sensor networks. In: The 2005 IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2005), pp. 1088–1097. Springer, Nagasaki (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Qiu, W., Zhou, Y., Zhu, B., Zheng, Y., Wen, M., Gong, Z. (2009). Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN. In: Park, J.H., Chen, HH., Atiquzzaman, M., Lee, C., Kim, Th., Yeo, SS. (eds) Advances in Information Security and Assurance. ISA 2009. Lecture Notes in Computer Science, vol 5576. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02617-1_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02617-1_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02616-4

  • Online ISBN: 978-3-642-02617-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics