skip to main content
10.1145/1514274.1514306acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

Evolutionary design of secrecy amplification protocols for wireless sensor networks

Published:16 March 2009Publication History

ABSTRACT

We propose a new method for automatic generation of secrecy amplification protocols for wireless sensor networks, utilizing evolutionary algorithms. We were able to rediscover all published protocols for secrecy amplification we are aware of, and found a new protocol that outperforms the existing ones. An alternative construction of secrecy amplification protocols with a comparable fraction of secure links to that of the original "node-oriented" approach was also designed. This new construction exhibits only linear (instead of exponential) increase of necessary messages when the number of communication neighbours grows. This efficient protocol can significantly reduce the sensor battery power consumption because of the decreased message transmission rate. We used a combination of linear genetic programming and a network simulator in this work.

References

  1. R. Anderson, H. Chan, and A. Perrig. Key infection: Smart trust for smart dust. In Proceedings of the Network Protocols (ICNP'04), 12th IEEE International Conference, Washington, DC, USA, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. W. Banzhaf, P. Nordin, R. Keller, and F. Francone. Genetic Programming -- An Introduction. Morgan Kaufmann Publishers, San Francisco, CA, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R. Bloom. An optimal class of symmetric key generation systems. In Proceedings of EUROCRYPT'84, Springer-Verlag LNCS 209, pages 335--338, 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Brameier and W. Banzhaf. Linear Genetic Programming. Springer, Berlin, 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In Proceedings of the 2003 IEEE Symposium on Security and Privacy (SP'03), Washington, DC, USA, pages 197--214. IEEE Computer Society, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. H. Chan, A. Perrig, and D. Song. Key distribution techniques for sensor networks. In Wireless sensor networks, pages 277--303, Norwell, MA, USA, 2004. Kluwer Academic Publishers. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. H.-J. Choi. Security protocol design by composition. In Technical report UCAM-CL-TR-657, University of Cambridge, 2006.Google ScholarGoogle Scholar
  8. D. Cvrcek and P. Svenda. Smart dust security - key infection revisited. International Workshop on Security and Trust Management 2005, ENTCS Vol. 157, Italy, pages 10--23, 2005.Google ScholarGoogle Scholar
  9. W. Du, J. Deng, Y. S. Han, and P. K. Varshney. A pairwise key pre-distribution for wireless sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03), Washington, DC, USA, pages 42--51, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS'02), Washington, DC, USA, pages 41--47, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. K. P. Ferentinos and T. A. Tsiligiridis. Adaptive design optimization of wireless sensor networks using genetic algorithms. Comput. Netw., 51(4):1031--1051, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Y. H. Kim, M. H. Kim, D. H. Lee, and C. Kim. A key management scheme for commodity sensor networks. ADHOC-NOW 2005, LNCS 3738, pages 113--126, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. R. Koza, F. H. B. III., D. Andre, and M. A. Keane. Genetic Programming III: Darwinian Invention and Problem Solving. Morgan Kaufmann Publishers, San Francisco, CA, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. D. Liu and P. Ning. Establishing pairwise keys in distributed sensor networks. In CCS '03: Proceedings of the 10th ACM conference on Computer and communications security, pages 52--61, New York, NY, USA, 2003. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. C. Meadows. Formal methods for cryptographic protocol analysis: emerging issues and trends. In IEEE Journal on Selected Areas in Communications, Volume 21, Issue 1, pages 44--54, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. Miller and P. Thomson. Cartesian Genetic Programming. In Proc. of the 3rd European Conference on Genetic Programming EuroGP2000, volume 1802 of Lecture Notes in Computer Science, pages 121--132. Springer-Verlag, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, vol. 21, issue 12, pages 993--999, 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. R. D. Pietro, L. V. Mancini, and A. Mei. Random key-assignment for secure wireless sensor networks. 1st ACM Workshop Security of Ad Hoc and Sensor Networks Fairfax, Virginia, pages 62--71, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. D. X. Song, S. Berezin, and A. Perrig. Athena: A novel approach to efficient automatic security protocol analysis. Journal of Computer Security, 9(1/2):47--74, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. P. `venda and V. Matyáa. Key distribution and secrecy amplification in wireless sensor networks. In Technical Report, FIMU-RS-2007-05, Masaryk University, Brno, 2007.Google ScholarGoogle Scholar

Index Terms

  1. Evolutionary design of secrecy amplification protocols for wireless sensor networks

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            WiSec '09: Proceedings of the second ACM conference on Wireless network security
            March 2009
            280 pages
            ISBN:9781605584607
            DOI:10.1145/1514274

            Copyright © 2009 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 16 March 2009

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate98of338submissions,29%

            Upcoming Conference

            WiSec '24

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader