skip to main content
10.1145/1497185.1497246acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmommConference Proceedingsconference-collections
research-article

A novel key management algorithm in sensor networks

Published: 24 November 2008 Publication History

Abstract

Data security in wireless sensor networks is very important, especially in hostile environment, where we must ensure that data is authentic, confidential, and not tampered on the road. Network authenticity and confidentiality need the existence of shared keys. These keys are highly recommended to be in small scopes so that the compromise of one node will not affect the whole network. Key management is critical to maintain the security functions. In this paper we introduce a new key management algorithm, which ensures that most of the node's neighbors are reliable. The proposed algorithm minimizes interaction with base station, number of transmitted packets, and energy consumption. In addition, it does not use large scope keys. Simulation results proof that the proposed algorithm is scalable in terms of storage and communication overhead, such that there is no correlation between the number of nodes in the network from one side and number of reliable neighbors and number of packets transmitted from the other side.

References

[1]
Neuman BC, Tso T. Kerberos: An authentication service for computer networks. IEEE Communications September 1994; 32(9). 33--38.
[2]
Perrig A, Szewczyk R, Wen V, Cullar D, Tygar JD, Spins: Security protocols for sensor networks. In Proceedings of the 7th Annual ACM/IEEE Internation Conference on Mobile Computing and Networking (MobiCom), Rome, Italy, July 2001. 189--199.
[3]
Diffie W, Hellman ME. New directions in cryptography. IEEE Transactions on Information Theory November 1976; 22. 644--654.
[4]
Rivest RL, Shamir A, Adleman LM. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978; 21(2). 120--126.
[5]
Rabin MO. Digitalized signatures and public key functions as intractable as factorization. MIT/LCS/TR-212, Massachusetts Institute of Technology, 1979.
[6]
Hoffstein J, Howgrave-Graham N, Pipher J, Silverman J, Whyte W. NTRUSign: Digital signatures using the NTRU lattice. In Topics in Cryptology-CT-RSA 2003; 2612 of LNCS. 122--140.
[7]
Sakiyama K, Batina L, Mentens N, Preneel B, Verbauwhede I. Small-footprint ALU for public-key processors for pervasive security. Workshop on RFID Security, July 2006.
[8]
Gaubatz G, Kaps J, Erdinç Öztürk, Sunar B. State of the Art in Ultra-Low Power Public Key Cryptography for Wireless Sensor Networks. Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops. Washington, DC, USA. 2005. 146--150.
[9]
Wander AS, Gura N, Eberle H, Gupta V, Shantz SC. Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks. Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications. Washington, DC, USA. 2005. 324--328.
[10]
Arazi B, Elhanany I, Arazi O, Qi H. Revisiting Public-Key Cryptography for Wireless Sensor Networks. Embedded Computing November 2005. 103--105.
[11]
Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks. in IEEE Symposium on Security and Privacy May 11--14 2003, Berkeley, California. 197--213.
[12]
Eschenauer L, Gligor VD. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on Computer and communications security, Washington November 18--22 2002, DC, USA. 41--47.
[13]
Du W, Deng J, Han YS, Chen S, Varshney PK. A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. IEEE INFOCOM 2004.
[14]
Hwang J, Kim Y. Revisiting random key pre-distribution schemes for wireless sensor networks. In Proceedings of the 2nd ACM workshop on Security of Ad hoc and Sensor Networks (SASN '04) 2004. 43--52.
[15]
Zhu S, Setia S, Jajodia S. Leap: efficient security mechanisms for large scale distributed sensor networks. In CCS '03: Proceedings of the 10th ACM conference on Computer and communications security 2003. 62--72.
[16]
Chan H, Perrig A. Pike: Peer intermediaries for key establishment in sensor networks. INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies 2005; 1. 524--535.
[17]
Naik V, Arora A, Bapat S, Gouda M. Whisper: Local Secret Maintenance in Sensor Networks. 2003.
[18]
Sobeih A, Chen W, Hou JC, Kung L, Li N, Lim H, Tyan H, Zhang H. J-Sim: A Simulation and Emulation Environment for Wireless Sensor Networks. Wireless Communications IEEE 2006; 13(4). 104--119.
[19]
Pottie J, Kaiser WJ. Embedding the internet wireless integrated network sensors. Communications of the ACM May 2000; 43(5). 51--58.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
MoMM '08: Proceedings of the 6th International Conference on Advances in Mobile Computing and Multimedia
November 2008
488 pages
ISBN:9781605582696
DOI:10.1145/1497185
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 November 2008

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

MoMM08

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media