ABSTRACT
Wireless Sensor Networks (WSN) have recently been in the limelight for many domains. The characteristics of sensor networks have imposed various restrictions on their system designs. Since sensor nodes usually are developed by low-cost hardware, one major challenge in the development of many sensor-network applications is to provide high-security features with limited resources. In this paper, we propose a half-key scheme based on the well-known random key pre-distribution scheme and DDHV-D deployment knowledge to provide resource-efficient key management in wireless sensor networks with reduced memory space requirements and better security enforcement. The capability of the proposed approach is evaluated by an analytical model and a series of experiments.
- H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In S&P '03: Proceedings of the 2003 IEEE Symposium on Security and Privacy, page 197, Washington, DC, USA, 2003. IEEE Computer Society. Google ScholarDigital Library
- W. Du, J. Deng, Y. S. Han, and P. K. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. In CCS '03: Proceedings of the 10th ACM conference on Computer and communications security, pages 42--51, New York, NY, USA, 2003. ACM. Google ScholarDigital Library
- W. Du, J. Deng, Y. S. Han, and P. K. Varshney. A key predistribution scheme for sensor networks using deployment knowledge. IEEE Trans. Dependable Secur. Comput., 3(1): 62, 2006. Google ScholarDigital Library
- L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In CCS '02: Proceedings of the 9th ACM conference on Computer and communications security, pages 41--47, New York, NY, USA, 2002. ACM. Google ScholarDigital Library
- M. Ikram, A. H. Chowdhury, B. Zafar, H.-S. Cha, K.-H. Kim, S.-W. Yoo, and D.-K. Kim. A simple lightweight authentic bootstrapping protocol for ipv6-based low rate wireless personal area networks (6lowpans). In IWCMC '09: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing, pages 937--941, New York, NY, USA, 2009. ACM. Google ScholarDigital Library
- Y. Law, R. Corin, S. Etalle, and P. Hartel. Scalable session key construction protocol for. wireless sensor networks. In IEEE Workshop on Large Scale Real-Time and Embedded Systems, 2003.Google Scholar
- D. Liu and P. Ning. Location-based pairwise key establishments for static sensor networks. In SASN '03: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pages 72--82, New York, NY, USA, 2003. ACM. Google ScholarDigital Library
- D. Liu, P. Ning, and W. Du. Group-based key pre-distribution in wireless sensor networks. In WiSe '05: Proceedings of the 4th ACM workshop on Wireless security, pages 11--20, New York, NY, USA, 2005. ACM. Google ScholarDigital Library
- D. Liu, P. Ning, and R. Li. Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur., 8(1): 41--77, 2005. Google ScholarDigital Library
- Z. Liu, J. Ma, Q. Pei, L. Pang, and Y. Park. Key infection, secrecy transfer, and key evolution for sensor networks. IEEE Trans. Wireless. Comm., 9: 2643--2653, August 2010. Google ScholarDigital Library
- J. Lopez. Unleashing public-key cryptography in wireless sensor networks. J. Comput. Secur., 14(5): 469--482, 2006. Google ScholarDigital Library
- A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001. Google ScholarDigital Library
- A. Rasheed and R. Mahapatra. Key predistribution schemes for establishing pairwise keys with a mobile sink in sensor networks. IEEE Trans. Parallel Distrib. Syst., 22: 176--184, January 2011. Google ScholarDigital Library
- S. Tripathy. Lisa: Lightweight security algorithm for wireless sensor networks. In ICDCIT, pages 129--134, 2007. Google ScholarDigital Library
- Y.-M. Tseng. A secure authenticated group key agreement protocol for resource-limited mobile devices. Comput. J., 50: 41--52, January 2007. Google ScholarDigital Library
- G. Wang, D. Choi, and D. Kang. A lightweight key renewal scheme for clustered sensor networks. In ICUIMC '09: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, pages 557--565, New York, NY, USA, 2009. ACM. Google ScholarDigital Library
- D. S. Wong and A. H. Chan. Efficient and mutually authenticated key exchange for low power computing devices. In Advances in Cryptology - ASIACRYPT'2001, December 2001. Google ScholarDigital Library
- Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway. A survey of key management schemes in wireless sensor networks. Comput. Commun., 30(11--12): 2314--2341, 2007. Google ScholarDigital Library
- C.-M. Yu, C.-S. Lu, and S.-Y. Kuo. A simple non-interactive pairwise key establishment scheme in sensor networks. In SECON'09: Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks, pages 360--368, Piscataway, NJ, USA, 2009. IEEE Press. Google ScholarDigital Library
- C.-M. Yu, C.-S. Lu, and S.-Y. Kuo. Noninteractive pairwise key establishment for sensor networks. IEEE Transactions on Information Forensics and Security, 5(3): 556--569, 2010. Google ScholarDigital Library
- C.-M. Yu, Y.-T. Tsou, C.-S. Lu, and S.-Y. Kuo. Practical and secure multidimensional query framework in tiered sensor networks. IEEE Transactions on Information Forensics and Security, 6(2): 241--255, 2011. Google ScholarDigital Library
- Z. Yu and Y. Guan. A key management scheme using deployment knowledge for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst., 19(10): 1411--1425, 2008. Google ScholarDigital Library
- J. Zheng, J. Li, M. J. Lee, and M. Anshel. A lightweight encryption and authentication scheme for wireless sensor networks. IJSN, 1(3/4): 138--146, 2006. Google ScholarDigital Library
- L. Zhou, J. Ni, and C. V. Ravishankar. Efficient key establishment for group-based wireless sensor deployments. In WiSe '05: Proceedings of the 4th ACM workshop on Wireless security, pages 1--10, New York, NY, USA, 2005. ACM. Google ScholarDigital Library
Recommendations
A lightweight key management scheme for wireless sensor networks
The use of wireless sensor networks (WSNs) in any real-world application requires a certain level of security. To provide security of operations such as message exchange, key management schemes have to be well adapted to the particularities of WSNs. ...
Hexagonal groups based key management using deployment knowledge in wireless sensor networks
ICACCI '12: Proceedings of the International Conference on Advances in Computing, Communications and InformaticsWireless sensor network (WSN) consists of large number of sensor nodes, which may be deployed in hostile environment. Hence, to provide security, the communication among sensor node is to be protected using encryption. Because of the resource ...
A pairwise key pre-distribution scheme for wireless sensor networks
CCS '03: Proceedings of the 10th ACM conference on Computer and communications securityTo achieve security in wireless sensor networks, it is important to be able to encrypt and authenticate messages sent among sensor nodes. Keys for encryption and authentication purposes must be agreed upon by communicating nodes. Due to resource ...
Comments