The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - July-September (2008 vol.5)
pp: 177-190
ABSTRACT
In random key pre-distribution techniques for wireless sensor networks, a relatively small number of keys are randomly chosen from a large key pool and loaded on the sensors prior to deployment. After deployment, each sensor tries to find a common key shared by itself and each of its neighbors to establish a link key to protect the wireless communication between themselves. One intrinsic disadvantage of such techniques is that some neighboring sensors do not share any common key. In order to establish a link key among such neighbors, a multi-hop secure path may be used to deliver the secret. Unfortunately, the possibility of sensors being compromised on the path may render such establishment process insecure. In this work, we propose and analyze a Just Enough Redundancy Transmission (JERT) scheme that uses the powerful Maximum Distance Separable (MDS) codes to address the problem. In the JERT scheme, the secret link key is encoded in (n, k) MDS code and transmitted through multiple multi-hop paths. To reduce the total information that needs to be transmitted, the redundant symbols of the MDS codes are transmitted only if the destination fails to decode the secret. The JERT scheme is demonstrated to be efficient and resilient against node capture. One salient feature of the JERT scheme is its flexibility of trading transmission for lower information disclosure.
INDEX TERMS
Wireless sensor networks, Network-level security and protection
CITATION
Jing Deng, Yunghsiang S. Han, "Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough Redundancy Transmission", IEEE Transactions on Dependable and Secure Computing, vol.5, no. 3, pp. 177-190, July-September 2008, doi:10.1109/TDSC.2007.70233
REFERENCES
[1] L. Eschenauer and V.D. Gligor, “A Key-Management Scheme for Distributed Sensor Networks,” Proc. Ninth ACM Conf. Computer and Comm. Security (CCS '02), pp. 41-47, Nov. 2002.
[2] H. Chan, A. Perrig, and D. Song, “Random Key Predistribution Schemes for Sensor Networks,” Proc. IEEE Symp. Security and Privacy (S&P '03), pp. 197-213, May 2003.
[3] W. Du, J. Deng, Y.S. Han, and P.K. Varshney, “A Pairwise Key Predistribution Scheme for Wireless Sensor Networks,” Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03), pp. 42-51, Oct. 2003.
[4] D. Liu and P. Ning, “Establishing Pairwise Keys in Distributed Sensor Networks,” Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03), pp. 52-61, Oct. 2003.
[5] W. Du, J. Deng, Y.S. Han, P.K. Varshney, J. Katz, and A. Khalili, “A Pairwise Key Predistribution Scheme for Wireless Sensor Networks,” ACM Trans. Information and System Security, vol. 8, no. 2, pp. 228-258, May 2005.
[6] D. Liu, P. Ning, and R. Li, “Establishing Pairwise Keys in Distributed Sensor Networks,” ACM Trans. Information and System Security, vol. 8, no. 1, pp. 41-77, Feb. 2005.
[7] W.B. Heinzelman, A.P. Chandrakasan, and H. Balakrishnan, “AnApplication-Specific Protocol Architecture for Wireless Microsensor Networks,” IEEE Trans. Wireless Comm., vol. 1, no. 4, pp. 660-670, Oct. 2002.
[8] S.A. Camtepe and B. Yener, “Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks,” Proc. Ninth European Symp. Research Computer Security (ESORICS '04), pp. 293-308, 2004.
[9] J. Lee and D.R. Stinson, “A Combinatorial Approach to Key Predistribution for Distributed Sensor Networks,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC '05), Mar. 2005.
[10] P. Papadimitratos and Z.J. Haas, “Secure Message Transmission in Mobile Ad Hoc Networks,” Elsevier Ad Hoc Networks, vol. 1, no. 1, pp. 193-209, July 2003.
[11] A. Tsirigos and Z.J. Haas, “Multipath Routing in the Presence of Frequent Topological Changes,” IEEE Comm. Magazine, pp.132-138, Nov. 2001.
[12] M.O. Rabin, “Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance,” J. ACM, vol. 36, no. 2, pp. 335-348, Apr. 1989.
[13] D. Huang and D. Medhi, “A Byzantine Resilient Multi-Path Key Establishment Scheme and Its Robustness Analysis for Sensor Networks,” Proc. 19th IEEE Int'l Parallel and Distributed Processing Symp. (IPDPS '05), p. 240, Apr. 2005.
[14] A. Shamir, “How to Share a Secret,” Comm. ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979.
[15] R.J. McEliece and D.V. Sarwate, “On Sharing Secrets and Reed-Solomon Codes,” Comm. ACM, vol. 24, no. 9, pp. 583-584, Sept. 1981.
[16] M.B. Pursley and S.D. Sandberg, “Incremental-Redundancy Transmission for Meteor-Burst Communications,” IEEE Trans. Comm., vol. 39, no. 5, pp. 689-702, May 1991.
[17] S.B. Wicker and M.J. Bartz, “Type-II Hybrid-ARQ Protocols Using Punctured MDS Codes,” IEEE Trans. Comm., vol. 42, nos. 2-4, pp.1431-1440, Feb.-Apr. 1994.
[18] W. Du, J. Deng, Y.S. Han, S. Chen, and P.K. Varshney, “A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge,” Proc. IEEE INFOCOM '04, pp. 586-597, Mar. 2004.
[19] S.B. Wicker and V.K. Bhargava, Reed-Solomon Codes and Their Applications. IEEE Press, 1994.
[20] I.S. Reed and X. Chen, Error-Control Coding for Data Networks. Kluwer Academic, 1999.
[21] S. Lin and D.J. Costello, Jr., Error Control Coding: Fundamentals and Applications, second ed. Prentice Hall, 2004.
[22] G.C. Clark, Jr. and J.B. Cain, Error-Correction Coding for Digital Comm. Plenum Press, 1981.
[23] W. Lou and Y. Fang, “A Multipath Routing Approach for Secure Data Delivery,” Proc. IEEE Military Comm. Conf. (MILCOM '01), pp. 1467-1473, Oct. 2001.
[24] P. Papadimitratos, Z.J. Haas, and E.G. Sirer, “Path Set Selection inMobile Ad Hoc Networks,” Proc. ACM MobiHoc '02, pp. 1-11, June 2002.
[25] P. Papadimitratos and Z.J. Haas, “Secure Data Transmission in Mobile Ad Hoc Networks,” IEEE J. Selected Areas in Comm., vol. 24, no. 2, pp. 343-356, Feb. 2006.
[26] T.K. Truong, W.L. Eastman, I.S. Reed, and I.S. Hsu, “Simplified Procedure for Correcting Both Errors and Erasures of Reed-Solomon Code Using Euclidean Algorithm,” IEE Proc., vol. 135, no. 6, pp. 318-324, Nov. 1988.
[27] S.-L. Shieh, S.-G. Lee, and W.-H. Sheen, “A Low-Latency Decoder for Punctured/Shortened Reed-Solomon Codes,” Proc. 16th IEEE Int'l Symp. Personal, Indoor and Mobile Radio Comm. (PIMRC '05), pp. 2547-2551, Sept. 2005.
[28] G.J. Pottie and W.J. Kaiser, “Wireless Integrated Network Sensors,” Comm. ACM, vol. 43, no. 5, pp. 51-58, May 2000.
[29] J. Deng and Y.S. Han, “Using MDS Codes for the Key Establishment of Wireless Sensor Networks,” Proc. Int'l Conf. Mobile Ad Hoc and Sensor Networks (MSN '05), pp. 732-744, Dec. 2005.
18 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool