Abstract
The establishment of secure links between neighboring nodes is one of the most challenging problems in wireless sensor networks. In this article, we present an efficient key predistribution scheme for sensor networks such that pairwise keys are defined by iterated hash computations based on a tree structure. Our scheme can be regarded as an improvement of HARPS, Ramkumar and Memon (IEEE J Sel Area Commun 23(3):611–621, 2005),or a generalization of Leighton and Micali’s scheme (Lect Notes Comput Sci 773:456–479, 1994). We rigorously analyze our scheme focusing on the resiliency of the network and hash computational complexity for each node and compare the performance with existing schemes. Specifically, we show that our scheme provides stronger resiliency and requires less hash computational complexity than HARPS.
Similar content being viewed by others
References
Blom, R. (1985). An optimal class of symmetric key generation systems. Lecture Notes in Computer Science, 209, 335–338. (Advances in Cryptology—EUROCRYPT ’84).
Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., & Yung, M. (1993). Perfectly-secure key distribution for dynamic conferences. Lecture Notes in Computer Science, 740, 471–486. (Advances in Cryptology—CRYPTO ’92).
Çamtepe, S. A., & Yener, B. (2004). Combinatorial design of key distribution mechanisms for wireless sensor networks. Lecture Notes in Computer Science, 3193, 293–308. (ESORICS 2004 Proceedings).
Carmen, D. W., Kruus, P. S., & Matt, B. J. (2000). Constraints and approaches for distributed sensor network security. NAI Labs Technical Report #00-010, September 2000.
Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. In IEEE Symposium on Research in Security and Privacy, May 2003 (pp. 197–213).
Delgosha, F., & Fekri, F. (2006). Threshold key-establishment in distributed sensor networks using a multivariate scheme. In Proceedings of the 25th IEEE International Conference on Computer Communications, April 2006.
Du, W., Deng, J., Han, Y. S., Chan, S., & Varsheney, P. K. (2004). A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of the 23th IEEE International Conference on Computer Communications, March 2004.
Du, W., Deng, J., Han, Y. S., & Varsheney, P. K. (2003). A pairwise key pre-distribution scheme for wireless sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security, October (pp. 42–51).
Eschenauer, L., & Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security, November 2002 (pp. 41–47).
Huang, D., Mehta, M., Medhi, D., & Harn, L. (2004). Location-aware key management scheme for wireless sensor networks. In Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, October 2004 (pp. 29–42).
Ito, T., Ohta, H., Matsuda, N., & Yoneda, T. (2005). A key pre-distribution scheme for secure sensor networks using probability density function of node deployment. In Proceedings of the 3nd ACM Workshop on Security of Ad Hoc and Sensor Networks, November 2005 (pp. 69–75).
Lee, J., & Stinson, D. R. On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs. ACM Transactions on Information and System Security, 11(2), Article 5.
Lee, J., & Stinson, D. R. (2004). Deterministic key predistribution schemes for distributed sensor networks. Lecture Notes in Computer Science, 3357, 294–307. (SAC 2004 Proceedings).
Lee, J., & Stinson, D. R. (2005). Tree-based key distribution patterns. Lecture Notes in Computer Science, 3897, 189–204. (SAC 2005 Proceedings).
Leighton, T., & Micali, S. (1994). Secret-key agreement without public-key cryptography. Lecture Notes in Computer Science, 773, 456–479. (Advances in Cryptology—CRYPTO ’93).
Liu, D., & Ning, P. (2003). Establishing pairwise keys in distributed sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security, October 2003 (pp. 52–61).
Liu, D., & Ning, P. (2003). Location-based pairwise key establishments for static sensor networks. In Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, October 2003 (pp. 72–82).
Martin, K. M., & Paterson, M. An application-oriented framework for wireless sensor network key establishment. To appear in Electronic Notes in Theoretical Computer Science.
Ramkumar, M. (2006). I-HARPS: An efficient key predistribution scheme for mobile computing applications. In Proceedings of IEEE Globecom ’06, November 2006.
Ramkumar, M., & Memon, N. (2005). An efficient key predistribution scheme for ad hoc network security. IEEE Journal on Selected Areas in Communications, 23(3), 611–621.
Roman, R., Zhou, J., & Lopez, J. (2005). On the security of wireless sensor network. Lecture Notes in Computer Science, 3482, 681–690. (ICCSA 2005 Proceedings).
Sanchez, D. S., & Baldus, H. (2005). A deterministic pairwise key pre-distribution scheme for mobile sensor networks. In Proceedings of the 1st IEEE/CreateNet International Conference on Security and Privacy for Emerging Areas in Communication Networks, September 2005 (pp. 277–288).
Traynor, P., Kumar, R., Choi, H., Cao, G., Zhu, S., & La Porta, T. (2006). Efficient hybrid security mechanisms for heterogeneous sensor networks. IEEE Transactions on Mobile Computing, 6(6), 663–677.
Wei, R., & Wu, J. (2004). Product construction of key distribution schemes for sensor networks. Lecture Notes in Computer Science, 3357, 280–293. (SAC 2004 Proceedings).
Xiao, Y., Rayi, V. K., Sun, B., Du, X., Hu, F., & Galloway, M. (2007). A survey of key management schemes in wireless sensor networks. Computer Communications, 30(11–12), 2314–2341.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lee, J., Kwon, D. Tree-based key predistribution for wireless sensor networks. Wireless Netw 15, 1140–1151 (2009). https://doi.org/10.1007/s11276-008-0108-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-008-0108-3