Skip to main content
Log in

Location dependent key management in sensor networks without using deployment knowledge

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

In this paper we propose an approach for key management in sensor networks which takes the location of sensor nodes into consideration while deciding the keys to be deployed on each node. As a result, this approach not only reduces the number of keys that have to be stored on each sensor node but also provides for the containment of node compromise. Thus compromise of a node in a location affects the communications only around that location. This approach which we call as location dependent key management does not require any knowledge about the deployment of sensor nodes. The proposed scheme starts off with loading a single key on each sensor node prior to deployment. The actual keys are then derived from this single key once the sensor nodes are deployed. The proposed scheme allows for additions of sensor nodes to the network at any point in time. We study the proposed scheme using both analysis and simulations and point out the advantages.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Notes

  1. The circle corresponding to the highest power level is not shown.

  2. We assume reliable communication of messages here.

References

  1. Basagni, S., Herrin, K., Bruschi, D., & Rosti, E. (2001). Secure pebblenet. In Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2001, October 2001.

  2. Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy, pp. 197–213, May 2003.

  3. Du, W., Deng, J., Han, Y., & Varshney, P. (2003). A pairwise key pre distribution scheme for wireless sensor networks. In Proceedings of the Tenth ACM Conference on Computer and Communications Security (CCS 2003), pp. 42–51, October 2003.

  4. Du, W., Deng, J., Han, Y. S., Chen, S., & Varshney, P. K. (2004). A key management scheme for wireless sensor networks using deployment knowledge. In INFOCOM, 2004, April 2004.

  5. Du, W., Deng, J., Han, Y. S., Varshney, P., Katz, J., & Khalili, A. (2005). A pairwise key pre-distribution scheme for wireless sensor networks. In ACM Transactions on Information and System Security (TISSEC), 2005.

  6. Eschenauer, L., & Gligor, V. (2002). A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47, November 2002.

  7. Liu, D., & Ning, P. (2003). Establishing pairwise keys in distributed sensor networks. In Proceedings of the Tenth ACM Conference on Computer and Communications Security (CCS 2003), pp. 52–61, October 2003.

  8. Liu, D., Ning, P., & Li, R. (2005). Establishing pairwise keys in distributed sensor networks. In ACM Transactions in Information Systems Security (Vol. 8, pp. 41–77), October 2005.

  9. Perrig, A., Szewczyk, R., Wen, V., Culler, D., & Tygar, J. D. (2002). Spins: Security protocols for sensor networks. In Wireless Networks Journal (WINE), September 2002.

  10. Zhu, S., Setia, S., & Jajodia, S. (2003). Leap: Efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS ’03), October 2003.

  11. Capkun, S., & Hubaux, J. P. (2005). Secure positioning of wireless devices with application to sensor networks. In IEEE Infocom, March 2005.

  12. Lazos, L., & Poovendran, R. (2004). Serloc: Secure range-independent localization for wireless sensor networks. In Proceedings of WISE, pp. 21–30, October 2004.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Farooq Anjum.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Anjum, F. Location dependent key management in sensor networks without using deployment knowledge. Wireless Netw 16, 1587–1600 (2010). https://doi.org/10.1007/s11276-008-0145-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-008-0145-y

Keywords

Navigation