ABSTRACT
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and compromise necessitate the use of an on-line key generation, where secret keys are generated by the nodes themselves. However, the cost of such schemes is high since their secrecy is based on computational complexity. Recently, several research contributions justified that the wireless channel itself can be used to generate information-theoretic secure keys between two parties. By exchanging sampling messages during movement, a bit string can be derived that is only known to the involved entities. Yet, movement is not the only possibility to generate randomness. The channel response is also strongly dependent on the frequency of the transmitted signal. In our work, we introduce a protocol for key generation based on the frequency-selectivity of channel fading. The great practical advantage of this approach is that we do not rely on node movement as the source of randomness. Thus, the frequent case of a sensor network with static motes is supported. Furthermore, the error correction property of the proposed protocol mitigates the effects of measurement errors and other temporal effects, giving rise to a key agreement rate of over 97%. We show the applicability of our protocol by implementing it on MICAz motes, and evaluate its robustness and secrecy through experiments and analysis.
- C.H. Foh A. Bose. A practical path loss model for indoor WiFi positioning enhancement. In International Conference on Information, Communications & Signal Processing, pages 1--5, 2007.Google Scholar
- Babak Azimi-Sadjadi, Aggelos Kiayias, Alejandra Mercado, and Bulent Yener. Robust Key Generation from Signal Envelopes in Wireless Networks. In CCS '07: Proceedings of the 14th ACM Conference on Computer and Communications Security, pages 401--410, New York, NY, USA, 2007. ACM. Google ScholarDigital Library
- S.A. Camtepe and B. Yener. Key Distribution Mechanisms for Wireless Sensor Networks: a Survey, 2005. Technical Report TR-05-07 Renesselaer Polytechnic Institute, Computer Science Department, March 2005.Google Scholar
- James J. Filliben. The probability plot correlation coefficient test for normality. Technometrics, 17(1):111--117, 1975.Google ScholarCross Ref
- K. Kaemarungsi and P. Krishnamurthy. Modeling of indoor positioning systems based on location fingerprinting. In Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), volume 2, pages 1012--1022, March 2004.Google ScholarCross Ref
- A. Liu and P. Ning. TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In Information Processing in Sensor Networks, 2008. IPSN'08. International Conference on, pages 245--256, 2008. Google ScholarDigital Library
- Suhas Mathur, Wade Trappe, Narayan Mandayam, Chunxuan Ye, and Alex Reznik. Radio-telepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel. In MobiCom '08: Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, pages 128--139, New York, NY, USA, 2008. ACM. Google ScholarDigital Library
- Ueli Maurer, Renato Renner, and Stefan Wolf. Unbreakable keys from random noise. In P. Tuyls, B. Skoric, and T. Kevenaar, editors, Security with Noisy Data, pages 21--44. Springer-Verlag, 2007.Google ScholarCross Ref
- Theodore Rappaport. Wireless Communications: Principles and Practice. Prentice Hall PTR, 2001. Google ScholarDigital Library
- Thomas Schürmann and Peter Grassberger. Entropy estimation of symbol sequences. CHAOS, 6:414, 1996.Google ScholarCross Ref
- Yong Sheng, Keren Tan, Guanling Chen, David Kotz, and Andrew Campbell. Detecting 802.11 MAC layer spoofing using received signal strength. In Proceedings of the 27th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), pages 1768--1776, April 2008.Google Scholar
- Ulrich Speidel, Mark Titchener, and Jia Yang. How well do practical information measures estimate the Shannon entropy? In Proc. of the Fifth International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP 2006), pages 861--865. IEEE, 2006.Google Scholar
- Arvinderpal Wander, Nils Gura, Hans Eberle, Vipul Gupta, and Sheueling Chang Shantz. Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks. In Proceedings of the third annual IEEE International Conference on Pervasive Computing and Communications (PerCom '05), pages 324--328, March 2005. Google ScholarDigital Library
- Matthias Wilhelm, Ivan Martinovic, and Jens B. Schmitt. On Key Agreement in Wireless Sensor Networks based on Radio Transmission Properties. In Proceedings of the 5th Annual Workshop on Secure Network Protocols (NPSec), pages 37--42, Princeton, New Jersey, USA, October 2009. IEEE Computer Society.Google ScholarCross Ref
- Y. Xiao, V.K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway. A Survey of Key Management Schemes in Wireless Sensor Networks. Computer communications, 30(11-12):2314--2341, 2007. Google ScholarDigital Library
Index Terms
- Secret keys from entangled sensor motes: implementation and analysis
Recommendations
Clustering-based minimum energy wireless m-connected k-covered sensor networks
EWSN'08: Proceedings of the 5th European conference on Wireless sensor networksDuty-cycling is an appealing solution for energy savings in densely deployed, energy-constrained wireless sensor networks (WSNs). Indeed, several applications, such as intruder detection and tracking, require the design of k-covered WSNs, which are ...
Diffusion-based approach to deploying wireless sensor networks
An important objective of Wireless Sensor Networks (WSNs) is to reliably sense data about the environment in which they are deployed. Reliability in WSNs has been widely studied in terms of providing reliable routing protocols for message dissemination ...
Minimum k, ω-angle barrier coverage in wireless camera sensor networks
Barrier coverage is an important issue in wireless sensor networks, which guarantees to detect any intruder attempting to cross a barrier or penetrating a protected region monitored by sensors. However, the barrier coverage problem in wireless camera ...
Comments