ABSTRACT
We propose a new method for automatic generation of secrecy amplification protocols for wireless sensor networks, utilizing evolutionary algorithms. We were able to rediscover all published protocols for secrecy amplification we are aware of, and found a new protocol that outperforms the existing ones. An alternative construction of secrecy amplification protocols with a comparable fraction of secure links to that of the original "node-oriented" approach was also designed. This new construction exhibits only linear (instead of exponential) increase of necessary messages when the number of communication neighbours grows. This efficient protocol can significantly reduce the sensor battery power consumption because of the decreased message transmission rate. We used a combination of linear genetic programming and a network simulator in this work.
- R. Anderson, H. Chan, and A. Perrig. Key infection: Smart trust for smart dust. In Proceedings of the Network Protocols (ICNP'04), 12th IEEE International Conference, Washington, DC, USA, 2004. Google ScholarDigital Library
- W. Banzhaf, P. Nordin, R. Keller, and F. Francone. Genetic Programming -- An Introduction. Morgan Kaufmann Publishers, San Francisco, CA, 1998. Google ScholarDigital Library
- R. Bloom. An optimal class of symmetric key generation systems. In Proceedings of EUROCRYPT'84, Springer-Verlag LNCS 209, pages 335--338, 1984. Google ScholarDigital Library
- M. Brameier and W. Banzhaf. Linear Genetic Programming. Springer, Berlin, 2007.Google ScholarDigital Library
- H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In Proceedings of the 2003 IEEE Symposium on Security and Privacy (SP'03), Washington, DC, USA, pages 197--214. IEEE Computer Society, 2003. Google ScholarDigital Library
- H. Chan, A. Perrig, and D. Song. Key distribution techniques for sensor networks. In Wireless sensor networks, pages 277--303, Norwell, MA, USA, 2004. Kluwer Academic Publishers. Google ScholarDigital Library
- H.-J. Choi. Security protocol design by composition. In Technical report UCAM-CL-TR-657, University of Cambridge, 2006.Google Scholar
- D. Cvrcek and P. Svenda. Smart dust security - key infection revisited. International Workshop on Security and Trust Management 2005, ENTCS Vol. 157, Italy, pages 10--23, 2005.Google Scholar
- W. Du, J. Deng, Y. S. Han, and P. K. Varshney. A pairwise key pre-distribution for wireless sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03), Washington, DC, USA, pages 42--51, 2003. Google ScholarDigital Library
- L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS'02), Washington, DC, USA, pages 41--47, 2002. Google ScholarDigital Library
- K. P. Ferentinos and T. A. Tsiligiridis. Adaptive design optimization of wireless sensor networks using genetic algorithms. Comput. Netw., 51(4):1031--1051, 2007. Google ScholarDigital Library
- Y. H. Kim, M. H. Kim, D. H. Lee, and C. Kim. A key management scheme for commodity sensor networks. ADHOC-NOW 2005, LNCS 3738, pages 113--126, 2005. Google ScholarDigital Library
- J. R. Koza, F. H. B. III., D. Andre, and M. A. Keane. Genetic Programming III: Darwinian Invention and Problem Solving. Morgan Kaufmann Publishers, San Francisco, CA, 1999. Google ScholarDigital Library
- D. Liu and P. Ning. Establishing pairwise keys in distributed sensor networks. In CCS '03: Proceedings of the 10th ACM conference on Computer and communications security, pages 52--61, New York, NY, USA, 2003. ACM Press. Google ScholarDigital Library
- C. Meadows. Formal methods for cryptographic protocol analysis: emerging issues and trends. In IEEE Journal on Selected Areas in Communications, Volume 21, Issue 1, pages 44--54, 2003. Google ScholarDigital Library
- J. Miller and P. Thomson. Cartesian Genetic Programming. In Proc. of the 3rd European Conference on Genetic Programming EuroGP2000, volume 1802 of Lecture Notes in Computer Science, pages 121--132. Springer-Verlag, 2000. Google ScholarDigital Library
- R. M. Needham and M. D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, vol. 21, issue 12, pages 993--999, 1978. Google ScholarDigital Library
- R. D. Pietro, L. V. Mancini, and A. Mei. Random key-assignment for secure wireless sensor networks. 1st ACM Workshop Security of Ad Hoc and Sensor Networks Fairfax, Virginia, pages 62--71, 2003. Google ScholarDigital Library
- D. X. Song, S. Berezin, and A. Perrig. Athena: A novel approach to efficient automatic security protocol analysis. Journal of Computer Security, 9(1/2):47--74, 2001. Google ScholarDigital Library
- P. `venda and V. Matyáa. Key distribution and secrecy amplification in wireless sensor networks. In Technical Report, FIMU-RS-2007-05, Masaryk University, Brno, 2007.Google Scholar
Index Terms
Evolutionary design of secrecy amplification protocols for wireless sensor networks
Recommendations
A New Approach to Secrecy Amplification in Partially Compromised Networks (Invited Paper)
Security, Privacy, and Applied Cryptography EngineeringAbstractUsage of various key (pre-)distribution schemes (KDSs) in networks with an active attacker results in a partially compromised network where some fraction of keys used to protect link communication is known to the attacker. The secrecy ...
Centralized and Clustered k-Coverage Protocols for Wireless Sensor Networks
Sensing coverage is an essential functionality of wireless sensor networks (WSNs). However, it is also well known that coverage alone in WSNs is not sufficient, and hence network connectivity should also be considered for the correct operation of WSNs. ...
Key establishment protocols using environmental and physiological data in wireless sensor networks
Wireless sensor networks provide solutions to a range of monitoring problems. However, they also introduce a new set of challenges mainly due to small memories, weak processors, and limited energy. As an example application, body sensor network is ...
Comments