Abstract
Since the conception of the seminal work proposed by Eschenauer and Gligor in 2002, several key predistribution mechanisms have been proposed in the literature in order to establish symmetric secret keys between any two neighbor sensor nodes in wireless sensor networks (WSNs) for secure communication. However, due to lack of prior deployment knowledge, limited resources of sensor nodes and security threats posed in the unattended environment of WSNs, it is always a challenging task to propose a better secure key predistribution scheme apart from existing schemes. In this paper, we aim to propose two new key predistribution schemes based on hashed key chains, which provide secure communication between the sensor nodes with the desired storage and communication overheads. The proposed schemes provide better tradeoff among security, network connectivity, and overheads as compared to those for other existing schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)
Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983)
Eschenauer, L., Gligor, V.D.: A key management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communication Security, pp. 41–47, Nov 2002
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, Berkeley, California (2003)
Castelluccia, C., Spognardi, A.R.: A robust key pre-distribution protocol for multi-phase wireless sensor networks. In: Proceedings of Third International Conference on Security and Privacy in Communication Networks (SecureComm’07), pp. 351–360 (2007)
Das, A.K., Giri, D.: An identity based key management scheme in wireless sensor networks. In: Proceedings of 4th Asian International Mobile Computing Conference (AMOC 2006), Kolkata, India, pp. 70–76. Tata McGrawHill Press, Kolkata (2006)
Kalkan, K., Yilmaz, S., Yilmaz, O.Z., Levi, A.: A highly resilient and zone-based key predistribution protocol for multiphase wireless sensor networks. In: Proceedings of the 5th ACM Symposium on QoS and Security for Wireless And Mobile Networks (Q2SWinet’09), pp. 29–36 (2009)
Unlu, A., Armagan, O., Levi, A., Savas, E., Ercetin O.: Key predistribution schemes for sensor networks for continuous deployment scenario. In: Proceedings of IFIP International Conferences on Networking (Networking 2007), Lecture Notes in Computer Science (LNCS), vol. 479, pp. 239–250 (2007)
Das, A.K.: An efficient random key distribution scheme for large-scale distributed sensor networks. Secur. Commun. Netw. 4(2), 162–180 (2011)
Das, A.K.: A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks. Int. J. Inf. Secur. 11(3), 189–211 (2012)
Das, A.K.: Improving Identity-based random key establishment scheme for large-scale hierarchical wireless sensor networks. Int. J. Netw. Secur. 14(1), 1–21 (2012)
Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of 10th ACM Conference on Computer and Communications Security (CCS), pp. 52–61. Washington DC, 27–31 Oct 2003
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, Nov 2003
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, D.: SPINS: security protocols for sensor networks. In: Proceedings of Seventh Annual International Conference on Mobile Computing and Networks, July 2001
Forouzan, B.A.: Cryptography and Network Security. Tata McGraw-Hill, New York (2007)
Das, A.K.: A location-adaptive key establishment scheme for large-scale distributed wireless sensor networks. J. Comput. 4(9), 896–904 (2009)
Acknowledgments
The authors would like to acknowledge the many helpful suggestions of the anonymous reviewers which have improved the content and the presentation of this paper.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this paper
Cite this paper
Hazra, P., Giri, D., Das, A.K. (2015). Key Chain-Based Key Predistribution Protocols for Securing Wireless Sensor Networks. In: Mohapatra, R., Chowdhury, D., Giri, D. (eds) Mathematics and Computing. Springer Proceedings in Mathematics & Statistics, vol 139. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2452-5_10
Download citation
DOI: https://doi.org/10.1007/978-81-322-2452-5_10
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2451-8
Online ISBN: 978-81-322-2452-5
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)