The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.07 - July (2008 vol.7)
pp: 858-868
ABSTRACT
Key pre-distribution has been claimed to be the only viable approach for establishing shared keys between neighboring sensors after deployment for a typical sensor network. However, none of the proposed key pre-distribution schemes simultaneously achieves good performance in terms of scalability in network size, key-sharing probability between neighboring sensors, memory overhead for keying information storage, and resilience against node capture attacks. In this paper, we propose SBK, an in-situ self-configuring framework to bootstrap keys in large-scale sensor networks. SBK is fundamentally different compared to all key pre-distribution schemes. It requires no keying information pre-deployment. In SBK, sensors differentiate their roles as either service nodes or worker nodes after deployment. Service sensors construct key spaces, and distribute keying information in order for worker sensors to bootstrap pairwise keys. An improved scheme, iSBK, is also proposed to speed up the bootstrapping procedure. We conduct both theoretical analysis and simulation study to evaluate the performances of SBK and iSBK. To the best of our knowledge, SBK and iSBK are the only key establishment protocols that simultaneously achieve good performance in scalability, key-sharing probability, storage overhead, and resilience against node capture attacks.
INDEX TERMS
Network-level security and protection, Security, integrity, and protection
CITATION
Fang Liu, Xiuzhen Cheng, Liran Ma, Kai Xing, "SBK: A Self-Configuring Framework for Bootstrapping Keys in Sensor Networks", IEEE Transactions on Mobile Computing, vol.7, no. 7, pp. 858-868, July 2008, doi:10.1109/TMC.2007.70775
REFERENCES
[1] Crossbow MPR400/410/420 MICA2 Mote, www.xbow.com/ Products/Product_pdf_files/ Wireless_pdfMICA2_Datasheet. pdf, 2007.
[2] R. Anderson, H. Chan, and A. Perrig, “Key Infection: Smart Trust for Smart Dust,” Proc. 12th IEEE Int'l Conf. Network Protocols (ICNP '04), 2004.
[3] R. Blom, “An Optimal Class of Symmetric Key Generation Systems,” Proc. Workshop Theory and Application of Cryptographic Techniques (EUROCRYPT '84), 1984.
[4] C. Blundo, A.D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, “Perfectly-Secure Key Distribution for Dynamic Conferences,” Proc. 12th Ann. Int'l Cryptology Conf. (CRYPTO '92), 1992.
[5] S.A. Camtepe and B. Yener, “Key Distribution Mechanisms for Wireless Sensor Networks: A Survey,” Technical Report TR-05-07, Rensselaer Polytechnic Inst., Mar. 2005.
[6] D.W. Carman, P.S. Kruss, and B.J. Matt, “Constraints and Approaches for Distributed Sensor Network Security,” Technical Report 00-010, NAI Laboratories, Sept. 2000.
[7] H. Chan, A. Perrig, and D. Song, “Random Key Predistribution Schemes for Sensor Networks,” Proc. IEEE Symp. Security and Privacy (SP '03), 2003.
[8] H. Chan and A. Perrig, “PIKE: Peer Intermediaries for Key Establishment in Sensor Networks,” Proc. IEEE INFOCOM '05, Mar. 2005.
[9] R. Di Pietro, L.V. Mancini, and A. Mei, “Efficient and Resilient Key Discovery Based on Pseudo-Random Key Pre-Deployment,” Proc. 18th Int'l Parallel and Distributed Processing Symp. (IPDPS '04), 2004.
[10] W. Du, J. Deng, Y.S. Han, and P.K. Varshney, “A Pairwise Key Predistribution Scheme for Wireless Sensor Networks,” Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03), 2003.
[11] W. Du, J. Deng, Y.S. Han, S. Chen, and P. Varshney, “A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge,” Proc. IEEE INFOCOM '04, Mar. 2004.
[12] W. Du, R. Wang, and P. Ning, “An Efficient Scheme for Authenticating Public Keys in Sensor Networks,” Proc. ACM MobiHoc '05, 2005.
[13] L. Eschenauer and V.D. Gligor, “A Key-Management Scheme for Distributed Sensor Networks,” Proc. Ninth ACM Conf. Computer and Comm. Security (CCS '02), 2002.
[14] D. Huang, M. Mehta, D. Medhi, and L. Harn, “Location-Aware Key Management Scheme for Wireless Sensor Networks,” Proc. Second ACM Workshop Security in Ad Hoc and Sensor Networks (SASN '04), 2004.
[15] Q. Li and D. Rus, “Global Clock Synchronization in Sensor Networks,” Proc. IEEE INFOCOM '04, 2004.
[16] D. Liu and P. Ning, “Establishing Pairwise Keys in Distributed Sensor Networks,” Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03), 2003.
[17] D. Liu and P. Ning, “Location-Based Pairwise Key Establishments for Static Sensor Networks,” Proc. First ACM Workshop Security in Ad Hoc and Sensor Networks (SASN '03), 2003.
[18] D. Liu, P. Ning, and W. Du, “Group-Based Key Predistribution in Wireless Sensor Networks,” Proc. Fourth ACM Workshop Wireless Security (WiSe '05), 2005.
[19] L. Ma, W. Jiang, K. Xing, and E.K. Park, “The Effective Radius Model for Multihop Wireless Networks,” Proc. First Int'l Conf. Wireless Algorithms, Systems, and Applications (WASA '06), 2006.
[20] G. Marsaglia, A. Zaman, and W.W. Tsang, “Towards a Universal Random Number Generator,” Statistics and Probability Letters, vol. 8, pp. 35-39, 1990.
[21] A.J. Menezes, P.C.V. Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography. CRC Press, 2001.
[22] A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J.D. Tygar, “SPINS: Security Protocols for Sensor Networks,” Proc. ACM MobiCom '01, July 2001.
[23] M.O. Rabin, “Digitalized Signatures and Public-Key Functions as Intractable as Factorization,” Technical Report MIT/LCS/TR-212, Laboratory for Computer Science, Massachusetts Inst. Tech nology, 1979.
[24] E. Shi and A. Perrig, “Designing Secure Sensor Networks,” IEEE Wireless Comm., vol. 11, no. 6, Dec. 2004.
[25] B. Sundararaman, U. Buy, and A.D. Kshemkalyani, “Clock Synchronization in Wireless Sensor Networks: A Survey,” AdHoc Networks, May 2005.
[26] R. Watro, D. Kong, S.-F. Cuti, C. Gardiner, C. Lynn, and P. Kruus, “TinyPK: Securing Sensor Networks with Public Key Technology,” Proc. Second ACM Workshop Security in Ad Hoc and Sensor Networks (SASN '04), Oct. 2004.
[27] K. Xing, S. Srinivasan, M. Rivera, J. Li, and X. Cheng, “Attacks and Countermeasures in Sensor Networks: A Survey,” Technical Report GWU-CS-TR-010-05, George Washington Univ., 2005.
[28] W. Ye, J. Heidemann, and D. Estrin, “An Energy-Efficient MAC Protocol for Wireless Sensor Networks,” Proc. IEEE INFOCOM '02, June 2002.
[29] L. Zhou, J. Ni, and C.V. Ravishankar, “Efficient Key Establishment for Group-Based Wireless Sensor Networks,” Proc. Fourth ACM Workshop Wireless Security (WiSe '05), 2005.
[30] S. Zhu, S. Xu, S. Setia, and S. Jajodia, “Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach,” Proc. 11th IEEE Int'l Conf. Network Protocols (ICNP '03), Nov. 2003.
[31] S. Zhu, S. Setia, and S. Jajodia, “Leap: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks,” Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03), 2003.
30 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool