Skip to main content

A Hybrid Key Predistribution Scheme for Sensor Networks Employing Spatial Retreats to Cope with Jamming Attacks

  • Conference paper
Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008)

Abstract

In order to provide security services in wireless sensor networks, a well-known task is to provide cryptographic keys to sensor nodes prior to deployment. It is difficult to assign secret keys for all pairs of sensor node when the number of nodes is large due to the large numbers of keys required and limited memory resources of sensor nodes. One possible solution is to randomly assign a few keys to sensor nodes and have nodes be able to connect to each other with some probability. This scheme has limitations in terms of the tradeoffs between connectivity and memory requirements. Recently, sensor deployment knowledge has been used to improve the level of connectivity while using lesser amounts of memory space. Jamming attacks are an easy and efficient means for disruption of the connectivity of sensors and thus the operation of a sensor network. One solution for mobile sensor nodes to overcome the impact of jamming is to perform spatial retreat by moving nodes away from jammed regions. However, deployment based key predistribution schemes may cause a large number of nodes to be cryptographically isolated after they move out of the jammed area. Moved nodes may not be able to reconnect to the network because they do not have any shared secret with new neighbors at new locations. In this paper, we propose a hybrid key predistribution scheme that supports spatial retreat strategies to cope with jamming attacks. Our scheme combines the properties of random and deployment knowledge based key predistribution schemes. In the presence of jamming attacks, our scheme provides high key connectivity (similar to deployment knowledge based schemes) while reducing the number of isolated nodes. We evaluate the performance of our scheme through simulations and analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  2. Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: IEEE INFOCOM, vol. 1, pp. 586–597 (2004)

    Google Scholar 

  3. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM conference on Computer and Communications Security CCS 2003 (2003)

    Google Scholar 

  4. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A key predistribution scheme for sensor networks using deployment knowledge. IEEE Transactions on Dependable and Secure Computing 3(1), 62–77 (2006)

    Article  Google Scholar 

  5. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: 9th ACM Conference on Computer and Communication Security, pp. 41–47 (November 2002)

    Google Scholar 

  6. Ma, K., Zhang, Y., Trappe, W.: Mobile network management and robust spatial retreats via network dynamics. In: 1st International Workshop on Resource Provisioning and Management in Sensor Networks (RPMSN 2005) (November 2005)

    Google Scholar 

  7. Noubir, G.: On Connectivity in Ac Hoc Networks under Jamming Using Directional Antennas and Mobility. In: Langendoerfer, P., Liu, M., Matta, I., Tsaoussidis, V. (eds.) WWIC 2004. LNCS, vol. 2957, pp. 186–200. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  8. Pelechrinis, K., Iliofotou, M.: Denial of service attacks in wireless networks: The case of jammers, http://www.cs.ucr.edu/~kpele/Jamming.pdf

  9. Wood, A., Stankovic, J., Son, S.: Jam: A jammed-area mapping service for sensor networks. In: 24th IEEE Real-Time Systems Symposium, pp. 286–297 (2003)

    Google Scholar 

  10. Xu, W.: On adjusting power to defend wireless networks from jamming. In: MobiQuitous: Mobile and Ubiquitous Systems: Networking and Services, pp. 1–6 (August 2007)

    Google Scholar 

  11. Xu, W., Ma, K., Trappe, W., Zhang, Y.: Jamming sensor networks: Attack and defense strategies. IEEE Network 20(3), 41–47 (2006)

    Article  Google Scholar 

  12. Xu, W., et al.: The feasibility of launching and detecting jamming attacks in wireless networks. In: MobiHoc 2005: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, pp. 46–57. ACM, New York (2005)

    Google Scholar 

  13. Xu, W., Wood, T., Trappe, W., Zhang, Y.: Channel surfing and spatial retreats: Defense against wireless dinal of service. In: ACM workshop on wireless security, pp. 80–89 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Panyim, K., Krishnamurthy, P. (2009). A Hybrid Key Predistribution Scheme for Sensor Networks Employing Spatial Retreats to Cope with Jamming Attacks. In: Bertino, E., Joshi, J.B.D. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2008. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 10. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03354-4_52

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03354-4_52

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03353-7

  • Online ISBN: 978-3-642-03354-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics