This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
A Two-Layer Key Establishment Scheme for Wireless Sensor Networks
September 2007 (vol. 6 no. 9)
pp. 1009-1020
In a large scale sensor network, it is infeasible to assign a unique Transport Layer Key (TLK) for each pair of nodes to provide the end-to-end security due to the huge memory cost per node. Thus conventional key establishment schemes follow a key pre-distribution approach to establish a Link Layer Key (LLK) infrastructure between neighboring nodes and rely on multi-hop paths to provide the end-to-end security. Their drawbacks include the vulnerability to the node compromise attack, large memory cost and energy inefficiency in the key establishment between neighboring nodes. In this paper, we propose a novel key establishment scheme, called LAKE, for sensor networks. LAKE uses a t-degree tri-variate symmetric polynomial to facilitate the establishment of both TLKs and LLKs between sensor nodes in a two-dimensional space, where each node can calculate direct TLKs and LLKs with some logically neighboring nodes and rely on those nodes to negotiate indirect TLKs and LLKs with other nodes. Any two end nodes can negotiate a TLK on demand directly or with the help of only one intermediate node, which can be determined in advance. As for the LLK establishment, LAKE is more secure under the node compromise attack with much less memory cost than conventional solutions. Due to the location-based deployment, LAKE is also energy efficient in that each node has direct LLKs with most neighbors without spending too much energy on the establishment of indirect LLKs with neighbors through multi-hop routing.

[1] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A Survey on Sensor Networks,” IEEE Comm. Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2002.
[2] J.M. Kahn, R.H. Katz, and K.S.J. Pister, “Next Century Challenges: Mobile Networking for Smart Dust,” Proc. MobiCom, pp. 217-278, Aug. 1999.
[3] G.J. Pottie and W.J. Kaiser, “Wireless Integrated Network Sensors,” Comm. ACM, vol. 43, no. 5, pp. 51-58, May 2000.
[4] H.T. Kung and D. Vlah, “Efficient Location Tracking Using Sensor Networks,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC '03), Mar. 2003.
[5] R. Brooks, P. Ramanathan, and A. Sayeed, “Distributed Target Classification and Tracking in Sensor Networks,” Proc. IEEE, vol. 91, no. 8, pp. 1163-1171, 2003.
[6] A. Wood and J. Stankovic, “Denial of Service in Sensor Networks,” IEEE Computer Magazine, vol. 35, no. 10, pp. 54-62, Oct. 2002.
[7] C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” Proc. First IEEE Int'l Workshop Sensor Network Protocols and Applications (SNPA '03), May 2003.
[8] R. Watro, D. Kong, S. Cuti, C. Gardiner, C. Lynn, and P. Kruus, “TinyPK: Securing Sensor Networks with Public Key Technology,” Proc. Second ACM Workshop Security of Ad Hoc and Sensor Networks (SASN '04), Oct. 2004.
[9] D.J. Malan, M. Welsh, and M.D. Smith, “A Public-Key Infrastructure for Key Distribution in Tinyos Based on Elliptic Curve Cryptography,” Proc. First IEEE Int'l Conf. Sensor and Ad Hoc Comm. and Networks (SECON '04), Oct. 2004.
[10] A. Perrig, R. Szewczyk, J.D. Tygar, V. Wen, and D.E. Culler, “SPINS: Security Protocols for Sensor Networks,” Wireless Networks, vol. 8, pp. 521-534, Sept. 2002.
[11] L. Eschenauer and V. Gligor, “A Key Management Scheme for Distributed Sensor Networks,” Proc. Ninth ACM Conf. Computer and Comm. Security (CCS '02), Nov. 2002.
[12] H. Chan, A. Perrig, and D. Song, “Random Key Predistribution Schemes for Sensor Networks,” Proc. IEEE Symp. Security and Privacy, pp. 197-213, May 2003.
[13] R.D. Pietro, L.V. Mancini, and A. Mei, “Random Key-Assignment for Secure Wireless Sensor Networks,” Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03), Oct. 2003.
[14] M. Ramkumar and N. Memon, “An Efficient Random Key Predistribution Scheme,” Proc. IEEE Global Telecomm. Conf. (Globecom '04), Dec. 2004.
[15] W. Du, J. Deng, Y.S. Han, and P.K. Varshney, “A Pairwise Key Predistribution Scheme for Wireless Sensor Networks,” Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03), Oct. 2003.
[16] D. Liu and P. Ning, “Establishing Pairwise Keys in Distributied Sensor Networks,” Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03), Oct. 2003.
[17] D. Liu, P. Ning, and R. Li, “Establishing Pairwise Keys in Distributed Sensor Networks,” ACM Trans. Information and System Security, vol. 8, no. 1, pp. 41-77, Feb. 2005.
[18] J. Hwang and Y. Kim, “Revisiting Random Key Predistibution Schemes for Wireless Sensor Networks,” Proc. Second ACM Workshop Security of Ad Hoc and Sensor Networks (SASN '04), Oct. 2004.
[19] R. Wei and J. Wu, “Product Construction of Key Distribution Sschemes for Sensor Networks,” Proc. 11th Int'l Workshop Selected Areas in Cryptography (SAC '04), Aug. 2004.
[20] H. Chan and A. Perrig, “Pike: Peer Intermediaries for Key Establishment in Sensor Networks,” Proc. INFOCOM, Mar. 2005.
[21] D. Liu and P. Ning, “Location-Based Pairwise Key Establishments for Relatively Static Sensor Networks,” Proc. ACM Workshop Security of Ad Hoc and Sensor Networks (SASN '03), Oct. 2003.
[22] W. Du, J. Deng, Y.S. Han, S. Chen, and P.K. Varshney, “A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge,” Proc. INFOCOM, Mar. 2004.
[23] D. Huang, M. Mehta, D. Medhi, and L. Harn, “Location-Aware Key Management Scheme for Wireless Sensor Networks,” Proc. Second ACM Workshop Security of Ad Hoc and Sensor Networks (SASN '04), Oct. 2004.
[24] Y. Zhou, Y. Zhang, and Y. Fang, “LLK: A Link-Layer Key Establishment Scheme in Wireless Sensor Networks,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC '05), Mar. 2005.
[25] Y. Zhou, Y. Zhang, and Y. Fang, “Key Establishment in Sensor Networks Based on Triangle Grid Deployment Model,” Proc. IEEE Military Comm. Conf. (MILCOM '05), Oct. 2005.
[26] Y. Zhou and Y. Fang, “A Scalable Key Agreement Scheme for Large Scale Networks,” Proc. IEEE Int'l Conf. Networking, Sensing and Control (ICNSC '06), Apr. 2006.
[27] S. Basagni, K. Herrin, D. Bruschi, and E. Rosti, “Secure Pebblenets,” Proc. MobiHoc, 2001.
[28] C.J. Mitchell and F.C. Piper, “Key Storage in Secure Networks,” Discrete Applied Math., 1995.
[29] M. Dyer, T. Fenner, A. Frieze, and A. Thomason, “On Key Storage in Secure Networks,” J. Cryptology, 1995.
[30] C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, “Perfectly-Secure Key Distribution for Dynamic Conferences,” Proc. Conf. Advances in Cryptology (CRYPTO '92), vol. 740, pp. 471-486, 1992.
[31] S. Zhu, S. Setia, and S. Jajodia, “LEAP: Efficient Security Mechanism for Large-Scale Distributed Sensor Networks,” Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03), Oct. 2003.
[32] J. Deng, C. Hartung, R. Han, and S. Mishra, “A Practical Study of Transitory Master Key Establishment for Wireless Sensor Networks,” Proc. First IEEE Int'l Conf. Security and Privacy for Emerging Areas in Comm. Networks (SecureComm '05), Sept. 2005.
[33] Y. Zhou, Y. Zhang, and Y. Fang, “Access Control in Wireless Sensor Networks,” Elsevier Ad Hoc Networks J., to appear.
[34] Y. Zhang, W. Liu, W. Lou, and Y. Fang, “Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks,” IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 247-260, Feb. 2006.
[35] H. Yang, F. Ye, Y. Yuan, S. Lu, and W. Arbaugh, “Toward Resilient Security in Wireless Sensor Networks,” Proc. MobiHoc, May 2005.
[36] W. Du, L. Fang, and P. Ning, “LAD: Localization Anomaly Detection for Wireless Sensor Networks,” Proc. 19th Int'l Parallel and Distributed Processing Symp. (IPDPS '05), Apr. 2005.
[37] R. Anderson and M. Kuhn, “Tamper Resistance—A Cautionary Note,” Proc. Second USENIX Workshop Electronic Commerce, pp. 1-11, Nov. 1996.
[38] Crossbow Technology, http:/www.xbow.com/, 2006.
[39] A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography. CRC Press, 1996.

Index Terms:
Sensor networks, transport layer, link layer, key establishment, node compromise
Citation:
Yun Zhou, Yuguang Fang, "A Two-Layer Key Establishment Scheme for Wireless Sensor Networks," IEEE Transactions on Mobile Computing, vol. 6, no. 9, pp. 1009-1020, Sept. 2007, doi:10.1109/TMC.2007.1008
Usage of this product signifies your acceptance of the Terms of Use.