skip to main content
10.1145/2103380.2103433acmconferencesArticle/Chapter ViewAbstractPublication PagesracsConference Proceedingsconference-collections
research-article

A half-key key management scheme for wireless sensor networks

Published:02 November 2011Publication History

ABSTRACT

Wireless Sensor Networks (WSN) have recently been in the limelight for many domains. The characteristics of sensor networks have imposed various restrictions on their system designs. Since sensor nodes usually are developed by low-cost hardware, one major challenge in the development of many sensor-network applications is to provide high-security features with limited resources. In this paper, we propose a half-key scheme based on the well-known random key pre-distribution scheme and DDHV-D deployment knowledge to provide resource-efficient key management in wireless sensor networks with reduced memory space requirements and better security enforcement. The capability of the proposed approach is evaluated by an analytical model and a series of experiments.

References

  1. H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In S&P '03: Proceedings of the 2003 IEEE Symposium on Security and Privacy, page 197, Washington, DC, USA, 2003. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. W. Du, J. Deng, Y. S. Han, and P. K. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. In CCS '03: Proceedings of the 10th ACM conference on Computer and communications security, pages 42--51, New York, NY, USA, 2003. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. W. Du, J. Deng, Y. S. Han, and P. K. Varshney. A key predistribution scheme for sensor networks using deployment knowledge. IEEE Trans. Dependable Secur. Comput., 3(1): 62, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In CCS '02: Proceedings of the 9th ACM conference on Computer and communications security, pages 41--47, New York, NY, USA, 2002. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Ikram, A. H. Chowdhury, B. Zafar, H.-S. Cha, K.-H. Kim, S.-W. Yoo, and D.-K. Kim. A simple lightweight authentic bootstrapping protocol for ipv6-based low rate wireless personal area networks (6lowpans). In IWCMC '09: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing, pages 937--941, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Y. Law, R. Corin, S. Etalle, and P. Hartel. Scalable session key construction protocol for. wireless sensor networks. In IEEE Workshop on Large Scale Real-Time and Embedded Systems, 2003.Google ScholarGoogle Scholar
  7. D. Liu and P. Ning. Location-based pairwise key establishments for static sensor networks. In SASN '03: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pages 72--82, New York, NY, USA, 2003. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. D. Liu, P. Ning, and W. Du. Group-based key pre-distribution in wireless sensor networks. In WiSe '05: Proceedings of the 4th ACM workshop on Wireless security, pages 11--20, New York, NY, USA, 2005. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Liu, P. Ning, and R. Li. Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur., 8(1): 41--77, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Z. Liu, J. Ma, Q. Pei, L. Pang, and Y. Park. Key infection, secrecy transfer, and key evolution for sensor networks. IEEE Trans. Wireless. Comm., 9: 2643--2653, August 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. Lopez. Unleashing public-key cryptography in wireless sensor networks. J. Comput. Secur., 14(5): 469--482, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. Rasheed and R. Mahapatra. Key predistribution schemes for establishing pairwise keys with a mobile sink in sensor networks. IEEE Trans. Parallel Distrib. Syst., 22: 176--184, January 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. S. Tripathy. Lisa: Lightweight security algorithm for wireless sensor networks. In ICDCIT, pages 129--134, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Y.-M. Tseng. A secure authenticated group key agreement protocol for resource-limited mobile devices. Comput. J., 50: 41--52, January 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. G. Wang, D. Choi, and D. Kang. A lightweight key renewal scheme for clustered sensor networks. In ICUIMC '09: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, pages 557--565, New York, NY, USA, 2009. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. D. S. Wong and A. H. Chan. Efficient and mutually authenticated key exchange for low power computing devices. In Advances in Cryptology - ASIACRYPT'2001, December 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Y. Xiao, V. K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway. A survey of key management schemes in wireless sensor networks. Comput. Commun., 30(11--12): 2314--2341, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. C.-M. Yu, C.-S. Lu, and S.-Y. Kuo. A simple non-interactive pairwise key establishment scheme in sensor networks. In SECON'09: Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks, pages 360--368, Piscataway, NJ, USA, 2009. IEEE Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. C.-M. Yu, C.-S. Lu, and S.-Y. Kuo. Noninteractive pairwise key establishment for sensor networks. IEEE Transactions on Information Forensics and Security, 5(3): 556--569, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. C.-M. Yu, Y.-T. Tsou, C.-S. Lu, and S.-Y. Kuo. Practical and secure multidimensional query framework in tiered sensor networks. IEEE Transactions on Information Forensics and Security, 6(2): 241--255, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Z. Yu and Y. Guan. A key management scheme using deployment knowledge for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst., 19(10): 1411--1425, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. J. Zheng, J. Li, M. J. Lee, and M. Anshel. A lightweight encryption and authentication scheme for wireless sensor networks. IJSN, 1(3/4): 138--146, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. L. Zhou, J. Ni, and C. V. Ravishankar. Efficient key establishment for group-based wireless sensor deployments. In WiSe '05: Proceedings of the 4th ACM workshop on Wireless security, pages 1--10, New York, NY, USA, 2005. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    RACS '11: Proceedings of the 2011 ACM Symposium on Research in Applied Computation
    November 2011
    355 pages
    ISBN:9781450310871
    DOI:10.1145/2103380

    Copyright © 2011 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 2 November 2011

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    Overall Acceptance Rate393of1,581submissions,25%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader