Skip to main content

Advertisement

Log in

Low-cost group rekeying for unattended wireless sensor networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Wireless sensor networks (WSNs) are made up of large groups of nodes that perform distributed monitoring services. Since sensor measurements are often sensitive data acquired in hostile environments, securing WSN becomes mandatory. However, WSNs consists of low-end devices and frequently preclude the presence of a centralized security manager. Therefore, achieving security is even more challenging. State-of-the-art proposals rely on: (1) attended and centralized security systems; or (2) establishing initial keys without taking into account how to efficiently manage rekeying. In this paper we present a scalable group key management proposal for unattended WSNs that is designed to reduce the rekeying cost when the group membership changes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

Notes

  1. The reason of calling it weight is to leave an open door for future research on how different unique weight assignments affect the protocol performance. Anyhow, in the simplest implementation, the weight is just a random unique identifier.

References

  1. Akyildiz, I., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393–422.

    Article  Google Scholar 

  2. Balenson, D. M., McGrew, D., & Sherman, A. (1999). Key management for large dynamic groups: One-way function trees and amortized initialization. In: IRTF SMUG meeting. Internet draft. Draft-balenson-groupkeymgmt-oft-00.txt.

  3. Bartoli, A., Hernández-Serrano, J., Soriano, M., Dohler, M., Kountouris, A., & Barthel, D. (2011). Secure lossless aggregation over fading and shadowing channels for smart grid m2m networks. IEEE Transactions on Smart Grid, 2(4), 844–864. doi:10.1109/TSG.2011.2162431.

    Google Scholar 

  4. Brown, J., Du, X., & Guizani, M. (2009). Efficient rekeying algorithms for wimax networks. Security and Communication Networks, 2(5), 392–400. doi:10.1002/sec.124.

    Google Scholar 

  5. Camtepe, S., & Yener, B. (2007). Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Transactions on Networking, 15(2), 346–358. doi:10.1109/TNET.2007.892879.

    Article  Google Scholar 

  6. Canh N. T., Truc, P., Hai, T. H., Hung, L. X., Lee, Y. K., & Lee, S. (2009). Enhanced group-based key management scheme for wireless sensor networks using deployment knowledge. In: 6th IEEE consumer communications and networking conference, 2009 (CCNC 2009) (pp. 1–5). doi:10.1109/CCNC.2009.4784870.

  7. Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM Computing Surveys, 41, 15:1–15:58. doi:10.1145/1541880.1541882.

  8. Chen, J., Kher, S., & Somani, A. (2006). Distributed fault detection of wireless sensor networks. In: Proceedings of the 2006 workshop on dependability issues in wireless ad hoc networks and sensor networks, DIWANS ’06 (pp. 65–72). New York, NY: ACM. doi:10.1145/1160972.1160985.

  9. da Silva, A. P. R., Martins, M. H. T., Rocha, B. P. S., Loureiro, A. A. F., Ruiz, L. B., & Wong, H. C. (2005). Decentralized intrusion detection in wireless sensor networks. In: Proceedings of the 1st ACM international workshop on quality of service & security in wireless and mobile networks, Q2SWinet ’05 (pp. 16–23). New York, NY: ACM. doi:10.1145/1089761.1089765.

  10. Di Pietro, R., Mancini, L., Law, Y. W., Etalle, S., & Havinga, P. (2003). Lkhw: A directed diffusion-based secure multicast scheme for wireless sensor networks. In: International conference on parallel processing workshops (pp. 397–406).

  11. Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J., & Khalili, A. A pairwise key predistribution scheme for wireless sensor networks. ACM Transaction on Information and System Security, 8(2), 228–258. doi:10.1145/1065545.1065548.

  12. Eschenauer, L., & Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on computer and communications security, CCS’02 (pp. 41–47). New York, NY: ACM. doi:10.1145/586110.586117.

  13. Hardjono, T., & Dondeti, L. R. (2003). Multicast and group security. Norwood, MA: Artech House, Inc. ISBN: 1580533426.

  14. Harney, H. (1999). Logical key hierarchy protocol (lkh). Internet draft. Draft-harney-sparta-lkhp-sec-00.

  15. Hernández-Serrano, J., Pegueroles, J., & Soriano, M. (2008). Shared self-organized gkm protocol for manets. Journal of Information Science and Engineering, 24(6), 6.

    Google Scholar 

  16. Huang, Y., & Lee, W. (2003) A cooperative intrusion detection system for ad hoc networks. In: Proceedings of the 1st ACM workshop on security of ad hoc and sensor networks (p. 147). New York, NY: ACM.

  17. Hui, J., & Thubert, P. (2011). RFC 6282—Compression format for IPv6 datagrams over IEEE 802.15.4-based networks. Internet Engineering Task Force (IETF)—Standards Track. http://datatracker.ietf.org/doc/rfc6282/.

  18. IEEE Computer Society. (2006). Wireless medium access control (MAC) and physical layer (PHY) specifications for low-rate wireless personal area networks (WPANs). In: IEEE standards publication delivered in electronic form.

  19. Kim, Y., Perrig, A., & Tsudik, G. (2004). Tree-based group key agreement. ACM Transactions on Information and System Security, 7(1), 60–96. doi:10.1145/984334.984337.

    Google Scholar 

  20. Krishnamachari, B., & Iyengar, S. (2004). Distributed bayesian algorithms for fault-tolerant event region detection in wireless sensor networks. IEEE Transactions on Computers, 53(3), 241–250. doi:10.1109/TC.2004.1261832.

    Google Scholar 

  21. Li, X., Wang, Y., & Frieder, O. (2002). Efficient hybrid key agreement protocol for wireless ad hoc networks. In: Proceedings of the eleventh IEEE international conference on computer communications and networks, 2002. (pp. 404–409).

  22. Li, X. S., Yang, Y. R., Gouda, M. G., & Lam, S. S. (2001). Batch rekeying for secure group communications. In: WWW ’01: Proceedings of the 10th international conference on World Wide Web (pp. 525–534). New York, NY: ACM Press. doi:10.1145/371920.372153.

  23. Liu, D., & Ning, P. (2003). Establishing pairwise keys in distributed sensor networks. In: CCS ’03: Proceedings of the 10th ACM conference on computer and communications security (pp. 52–61). New York, NY: ACM Press. doi:10.1145/948109.948119.

  24. Lopez, J., & Zhou, J. (2008). Wireless Wireless sensor network security. Amsterdam, The Netherlands: IOS Press.

    Google Scholar 

  25. Meng, J., Li, H., & Han, Z. (2009). Sparse event detection in wireless sensor networks using compressive sensing. In: 43rd Annual conference on information sciences and systems (CISS 2009).

  26. Mittra, S. (1997). Iolus: A framework for scalable secure multicasting. SIGCOMM Computer Communication Review, 27(4), 277–288. doi:10.1145/263109.263179.

  27. Molisch, A., Balakrishnan, K., Chong, C., Emami, S., Fort, A., Karedal, J., et al. (2006). IEEE 802.15.4a channel model-final report. IEEE P, 15, 802–1504.

  28. Pegueroles, J., & Rico-Novella, F. (2003). Balanced batch lkh: new proposal, implementation and performance evaluation. In: Proceedings of the eighth IEEE international symposium on Computers and Communication, 2003 (ISCC 2003) (Vol. 2, pp. 815–820). doi:10.1109/ISCC.2003.1214218.

  29. Pegueroles, J., Rico-Novella, F., Hernández-Serrano, J., & Soriano, M. (2003a). Adapting GDOI for balanced batch-LKH “draft-ietf-msec-gdoi-batch-lkh-00.txt”. Internet draft. Work in progress.

  30. Pegueroles, J., Rico-Novella, F., Hernández-Serrano, J., & Soriano, M. (2003b). Improved lkh for batch rekeying in multicast groups. In: IEEE International conference on information technology research and education (ITRE). New Jersey: E.E.U.U.

  31. Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., & Culler, D. E. (2002). Spins: security protocols for sensor networks. Wireless Networks, 8(5), 521–534. doi:10.1023/A:1016598314198.

    Google Scholar 

  32. Steiner, M., Tsudik, G., & Waidner, M. (1996). Diffie-hellman key distribution extended to group communication. In: CCS ’96: Proceedings of the 3rd ACM conference on computer and communications security (pp. 31–37). New York, NY: ACM. doi:10.1145/238168.238182.

  33. Tse, D., & Viswanath, P. (2005). Fundamentals of wireless communication. Cambridge University Press. doi:10.2277/0521845270.

  34. Wallner, D., Harder, E., & Agee, R. (1998). Key management for multicast: Issues and architectures. RFC, 2627.

  35. Wander, A. S., Gura, N., Eberle, H., Gupta, V., & Shantz, S. C. (2005). Energy analysis of public-key cryptography for wireless sensor networks. In: PERCOM ’05: Proceedings of the third IEEE international conference on pervasive computing and communications (pp. 324–328). Washington, DC: IEEE Computer Society. doi:10.1109/PERCOM.2005.18.

  36. Wang, T. Y., Chang, L. Y., Duh, D. R., & Wu, J. Y. (2008). Fault-tolerant decision fusion via collaborative sensor fault detection in wireless sensor networks. IEEE Transactions on Wireless Communications, 7(2), 756–768. doi:10.1109/TWC.2008.060653.

    Article  Google Scholar 

  37. Wang, Y., Wang, X., Xie, B., Wang, D., & Agrawal, D. P. (2008). Intrusion detection in homogeneous and heterogeneous wireless sensor networks. IEEE Transactions on Mobile Computing, 7, 698–711. doi:10.1109/TMC.2008.19.

    Google Scholar 

  38. Zhang, Y., Meratnia, N., & Havinga, P. (2010). Outlier detection techniques for wireless sensor networks: A survey. IEEE Communications Surveys Tutorials, 12(2), 159–170. doi:10.1109/SURV.2010.021510.00088.

    Google Scholar 

  39. Zhu, S., Setia, S., & Jajodia, S. (2006). Leap+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Network, 2(4), 500–528. doi:10.1145/1218556.1218559.

Download references

Acknowledgments

This work has been partially supported by the Spanish Comisión Interministerial de Ciencia y Tecnología (CICYT) with the project P2PSEC (TEC2008-06663-C03-01), the Spanish Ministerio de Ciencia e Innovación with the CONSOLIDER project ARES (CSD2007-00004), the Spanish Ministerio de Industria, Energía y Turismo with the AVANZA funds for ITEA2 project DiCoMa (TSI-020400-2011-55) and the Generalitat de Catalunya with the grant 2009 SGR-1362 to consolidated research groups awarded to the Information Security Group of the Universitat Politècnica de Catalunya.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Juan Hernández-Serrano.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hernández-Serrano, J., Vera-del-Campo, J., Pegueroles, J. et al. Low-cost group rekeying for unattended wireless sensor networks. Wireless Netw 19, 47–67 (2013). https://doi.org/10.1007/s11276-012-0450-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-012-0450-3

Keywords