The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.10 - October (2008 vol.19)
pp: 1411-1425
ABSTRACT
Wireless sensor networks pose new security and privacy challenges. One of the important challenges is how to bootstrap secure communications among nodes. Several key management schemes have been proposed. However, they either cannot offer strong resilience against node capture attacks, or require too much memory for achieving the desired connectivity. In this paper, we propose a novel key management scheme using deployment knowledge. In our scheme, a target field is divided into a number of hexagon grids and sensor nodes are divided into the same number of groups as that of grids, where each group is deployed into a unique grid. By using deployment knowledge, we drastically reduce the number of potential groups from which a node?s neighbors may come. Thus, a pairwise key can be generated efficiently for any two neighbor nodes. Compared with existing schemes, our scheme achieves higher connectivity with a much lower memory requirement and shorter transmission range. It also outperforms others in terms of resilience against node capture attacks.
INDEX TERMS
Key Management, Sensor networks
CITATION
Zhen Yu, Yong Guan, "A Key Management Scheme Using Deployment Knowledge for Wireless Sensor Networks", IEEE Transactions on Parallel & Distributed Systems, vol.19, no. 10, pp. 1411-1425, October 2008, doi:10.1109/TPDS.2008.23
REFERENCES
[1] R. Blom, “An Optimal Class of Symmetric Key Generation Systems,” Proc. Workshop Theory and Application of Cryptographic Techniques on Advances in Cryptology (EUROCRYPT '85), pp. 335-338, 1985.
[2] C. Blundo, A. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, “Perfectly-Secure Key Distribution for Dynamic Conferences,” Proc. 13th Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '93), pp. 471-486, 1993.
[3] H. Chan, A. Perrig, and D. Song, “Random Key Predistribution Schemes for Sensor Networks,” Proc. IEEE Symp. Security and Privacy (SP '03), pp. 197-213, 2003.
[4] W. Du, J. Deng, Y.S. Han, and P.K. Varshney, “A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks,” Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03), pp. 42-51, 2003.
[5] W. Du, J. Deng, Y.S. Han, S. Chen, and P.K. Varshney, “A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge,” Proc. IEEE INFOCOM, 2004.
[6] L. Eschenauer and V.D. Gligor, “A Key-Management Scheme for Distributed Sensor Networks,” Proc. Ninth ACM Conf. Computer and Comm. Security (CCS '02), pp. 41-47, 2002.
[7] P. Gupta and P.R. Kumar, “Critical Power for Asymptotic Connectivity in Wireless Networks,” Stochastic Analysis, Control, Optimization and Applications: A Volume in Honor of W.H. Fleming, pp. 547-566, 1998.
[8] N. Gura, A. Patel, A. Wander, H. Eberle, and S. Shantz, “Comparing Elliptic Curve Cryptography and RSA on 8-Bit CPUs,” Proc. Sixth Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '04), pp. 119-132, 2004.
[9] D. Liu and P. Ning, “Establishing Pairwise Keys in Distributed Sensor Networks,” Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03), pp. 52-56, 2003.
[10] D. Liu and P. Ning, “Location-Based Pairwise Key Establishment for Static Sensor Networks,” Proc. First ACM Workshop Security of Ad Hoc and Sensor Networks (SASN '03), pp. 72-82, 2003.
[11] D. Liu and P. Ning, “Improving Key Pre-Distribution with Deployment Knowledge in Static Sensor Networks,” ACM Trans. Sensor Networks (ToSN), vol. 1, no. 2, pp. 204-239, 2005.
[12] M.D. Penrose, “The Longest Edge of the Random Minimum Spanning Tree,” The Annals of Applied Probability, vol. 7, no. 2, pp. 340-361, 1997.
[13] S. Shakkottai, R. Srikant, and N. Shroff, “Unreliable Sensor Grids: Coverage, Connectivity and Diameter,” Proc. IEEE INFOCOM, 2003.
[14] J.H. Spencer, The Strange Logic of Random Graphs. Springer, 2001.
[15] H. Wang and Q. Li, “Efficient Implementation of Public Key Cryptosystems on Mote Sensors,” Proc. Eighth Int'l Conf. Information and Comm. Security (ICICS '06), pp. 519-528, 2006.
[16] Z. Yu and Y. Guan, “A Key Pre-Distribution Scheme Using Deployment Knowledge for Wireless Sensor Networks,” Proc. Fourth Int'l Symp. Information Processing in Sensor Networks (IPSN '05), pp. 261-268, 2005.
[17] Z. Yu and Y. Guan, “A Robust Group-Based Key Management Scheme for Wireless Sensor Networks,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC '05), vol. 4, pp. 1915-1920, 2005.
[18] S. Zhu, S. Setia, and S. Jajodia, “LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks,” Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03), pp. 62-72, 2003.
[19] S. Zhu, S. Xu, S. Setia, and S. Jajodia, “Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach,” Proc. 11th IEEE Int'l Conf. Network Protocols (ICNP '03), pp. 326-335, 2003.
19 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool