skip to main content
10.1145/1509315.1509406acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicaitConference Proceedingsconference-collections
research-article

Study of improved key distribution mechanisms based on two-layer structure for wireless sensor network

Published: 29 July 2008 Publication History

Abstract

One of the key issues for wireless sensor network is designing viable security mechanisms for the protection of confidentiality, integrity and authentication to prevent malicious attacks, but with nodes' limited capabilities. Efficient Key Distribution mechanisms is so important for WSN's security. In this paper, we present two key distribution schemes based on two-layer structure for wireless sensor network, which relies the BFIBE algorithm [5] to build the Upper-Layer security links. Other keys for link encryption are distributed and agreed with the help of Upper-Layer nodes. To our knowledge, ours is the first work to discuss implementation issues on the key distribution mechanisms based on two-layer structure which only use BFIBE algorithm in the Upper-Layer. The presented schemes can torrent nodes' capture. As for security, computational complexity, and efficiency, the presented schemes have certain advantages.

References

[1]
S. A. Identity-based cryptography and signature schemes. In Proceedings of Advances in Cryptology (CRYPTO'84), pages 47--53.
[2]
J. Abraham and K. S. Ramanatha. A complete set of protocols for distributed key management in clustered wireless sensor networks. In Proceedings of International Conference on Multimedia and Ubiquitous Engineering, pages 920--925.
[3]
V. P. M. D. Arjan Durresi, Vijay Bulusu and R. Jain. Key distribution in mobile heterogeneous sensor networks. In Proceedings of 49th annual IEEE Global Telecommunications Conference, pages 1--5.
[4]
H. E. V. G. Arvinderpal Wander, Nils Gura and S. C. Shantz. Energy analysis of public-key cryptography for wireless sensor networks. In Proceedings of 3rd IEEE International Conference on Pervasive Computing and Communications, pages 324--328.
[5]
D. Boneh and M. K. Franklin. Identity-based encryption from the weil pairing. In Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, pages 213--229. Springer-Verlag.
[6]
Y. Cheng and D. Agrawal. An improved key distribution mechanism for large-scale hierarchical wireless sensor networks. Ad Hoc Networks, 5(1):35--48.
[7]
L. D. and N. P. Location-based pairwise key establishments for static sensor networks. In Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, pages 72--82, New York. ACM Press.
[8]
M. D. S. David J. Malan, Matt Welsh. A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography. In Proceedings of First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, IEEE SECON 2004, pages 71--80.
[9]
J. H. e. a. Debotah Estrin, Ramesh Govindan. Next century challenges:scalable coordination in sensor networks. In Proceedings of ACM/IEEE International Conference on Mobile Computing and Networking, pages 263--270, Seattle.
[10]
N. Koblitz. Elliptic curve cryptosystems. Mathematics of Communication, 48(177):203--209.
[11]
E. L. and G. V. D. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on Computer and Communications Security, pages 41--47, Washington DC. ACM Press.
[12]
V. Miller. Use of elliptic curves in cryptography. In Proceedings of Advances in Cryptology-CRYPTO'85, pages 417--426.
[13]
E. B. Mohamed Shehab and A. Ghafoor. Efficient hierarchical key generation and key diffusion for sensor networks. In Proceedings of Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, pages 76--84.
[14]
T. J. W. V. Perrig A., Szewczyk R. and C. D. Spins: Security protocols for sensor networks. ACM Wireless Network, 8(5):521--534.
[15]
S. K. Suman Banerjee. A clustering scheme for hierarchical control in multi-hop wireless networks. In Proceedings of IEEE Infocom 2001, pages 1028--1037.
[16]
S. V. Gupta et al. A standards-based end-to-end security architecture for the embedded internet. In Proceedings of 3rd IEEE International Conference on Pervasive Computing and Communications, pages 247--256.
[17]
Y. H. S. C. W. Du, J. Deng and P. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of the IEEE Infocom'04, pages 586--597, Piscataway.

Index Terms

  1. Study of improved key distribution mechanisms based on two-layer structure for wireless sensor network

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        ICAIT '08: Proceedings of the 2008 International Conference on Advanced Infocomm Technology
        July 2008
        677 pages
        ISBN:9781605580883
        DOI:10.1145/1509315
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 29 July 2008

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. ad hoc
        2. identity based encryption
        3. key distribution
        4. sensor networking
        5. two-layer structure
        6. wireless sensor network

        Qualifiers

        • Research-article

        Funding Sources

        Acceptance Rates

        ICAIT '08 Paper Acceptance Rate 89 of 151 submissions, 59%;
        Overall Acceptance Rate 122 of 207 submissions, 59%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 117
          Total Downloads
        • Downloads (Last 12 months)2
        • Downloads (Last 6 weeks)1
        Reflects downloads up to 18 Feb 2025

        Other Metrics

        Citations

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media