Skip to main content
Log in

A Hybrid Key Predistribution Scheme for Sensor Networks Employing Spatial Retreats to Cope with Jamming Attacks

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

In order to provide security services in wireless sensor networks, a well-known task is to provide cryptographic keys to sensor nodes prior to deployment. It is difficult to assign secret keys for all pairs of sensor node when the number of nodes is large due to the large numbers of keys required and limited memory resources of sensor nodes. One possible solution is to randomly assign a few keys to sensor nodes and have nodes be able to connect to each other with some probability. This scheme has limitations in terms of the tradeoffs between connectivity and memory requirements. Recently, sensor deployment knowledge has been used to improve the level of connectivity while using lesser amounts of memory space. However, deployment based key predistribution schemes may cause a large number of nodes to be cryptographically isolated if nodes move after key pre-distribution. Mobility may be necessitated for reasons depending on applications or scenarios. In this paper, we consider mobility due to spatial retreat of nodes under jamming attacks as an example. Jamming attacks are easy and efficient means for disruption of the connectivity of sensors and thus the operation of a sensor network. One solution for mobile sensor nodes to overcome the impact of jamming is to perform spatial retreats by moving nodes away from jammed regions. Moved nodes may not be able to reconnect to the network because they do not have any shared secret with new neighbors at new locations if strict deployment knowledge based key predistribution is employed. In this paper, we propose a hybrid key predistribution scheme that supports spatial retreat strategies to cope with jamming attacks. Our scheme combines the properties of random and deployment knowledge based key predistribution schemes. In the presence of jamming attacks, our scheme provides high key connectivity (similar to deployment knowledge based schemes) while reducing the number of isolated nodes. We evaluate the performance of our scheme through simulations and analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Akyildiz I, Su W, Sankarasubramaniam Y, Cayirci E (2002) A survey on sensor networks. IEEE Commun Mag 40(8):102–114

    Article  Google Scholar 

  2. Bettstetter C, Hartmann C, Moser C (2005) How does randomized beamforming improve the connectivity of ad hoc networks? In: Proc. IEEE international conference on communications (ICC’05)

  3. Blom R (1985) An optimal class of symmetric key generation systems. In: Proceedings of the EUROCRYPT 84 workshop on advances in cryptology. Springer, New York, pp 335–338

    Google Scholar 

  4. Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. In: Proceeding of IEEE symposium on security and privacy, pp 197–213

  5. Di Pietro R, Mancini LV, Mei A (2004) Efficient and resilient key discovery based on pseudo-random key pre-deployment. In: IEEE international parallel and distributed processing symposium (IPDPS’04)

  6. Du W, Deng J, Han Y, Varshney P (2003) A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM conference on computer and communications security (CCS’03). ACM, New York, pp 42–51

    Chapter  Google Scholar 

  7. Du W, Deng J, Han YS, Chen S, Varshney PK (2004) A key management scheme for wireless sensor networks using deployment knowledge. In: The 23rd conference of the IEEE Communications Society (INFOCOM’04), vol 1, p 597

  8. Du W, Deng J, Han YS, Varshney PK (2006) A key predistribution scheme for sensor networks using deployment knowledge. IEEE Trans Dependable Secure Comput 3(1):62–77

    Article  Google Scholar 

  9. Eschenauer L, Gligor VD (2002) A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on computer and communications security (CCS’02). ACM, New York, pp 41–47

    Chapter  Google Scholar 

  10. Ma K, Zhang Y, Trappe W (2005) Mobile network management and robust spatial retreats via network dynamics. In: International conference on mobile adhoc and sensor systems conference (MASS’05). IEEE, New York

  11. Noubir G (2004) On connectivity in ad hoc network under jamming using directional antennas and mobility. In: International conference on wired/wireless internet communications (WWIC’04), pp 186–200

  12. Pelechrinis K, Broustis I, Krishnamurthy SV (2009) Ares: an anti-jamming reinforcement system for 802.11 networks. In: Proc. ACM CoNext’09

  13. Pelechrinis K, Iliofotou M, Krishnamurthy SV (2010) Denial of service attacks in wireless networks: the case of jammers, to appear in IEEE Commun Surv Tutorials (2nd quarter 2011)

  14. Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD (2001) Spins: security protocols for sensor networks. In: Wireless networks, vol 8, pp 189–199

  15. Wang Y, Attebury G, Ramamurthy B (2006) A survey of security issues in wireless sensor networks. IEEE Commun Surv Tutorials 8(2):2–23

    Article  Google Scholar 

  16. Wood AD, Stankovic JA, Son SH (2003) Jam: a jammed-area mapping service for sensor networks. In: Proceedings of the 24th IEEE real-time systems symposium (RTSS’03), pp 286–297

  17. Xu W (2007) On adjusting power to defend wireless networks from jamming. In: 4th annual international conference on mobile and ubiquitous systems (MobiQuitous’07), pp 1–6

  18. Xu W, Wood T, Trappe W, Zhang Y (2004) Channel surfing and spatial retreats: defenses against wireless denial of service. In: Proceedings of the 3rd ACM workshop on wireless security (WiSe’04). ACM, New York, pp 80–89

    Chapter  Google Scholar 

  19. Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing (MobiHoc’05). ACM, New York, pp 46–57

    Chapter  Google Scholar 

  20. Xu W, Ma K, Trappe W, Zhang Y (2006) Jamming sensor networks: attack and defense strategies. IEEE Netw 20(3):41–47

    Article  Google Scholar 

Download references

Acknowledgements

This work was funded in part by the National Science Foundation Award No. CNS-0721183. The authors would like to thank the anonymous reviewers for their comments and suggestions to improve the paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Korporn Panyim.

Additional information

This work was funded in part by the National Science Foundation Award No. CNS-0721183.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Panyim, K., Krishnamurthy, P. A Hybrid Key Predistribution Scheme for Sensor Networks Employing Spatial Retreats to Cope with Jamming Attacks. Mobile Netw Appl 17, 327–341 (2012). https://doi.org/10.1007/s11036-010-0244-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-010-0244-8

Keywords

Navigation