Skip to main content

Key Chain-Based Key Predistribution Protocols for Securing Wireless Sensor Networks

  • Conference paper
  • First Online:
Mathematics and Computing

Part of the book series: Springer Proceedings in Mathematics & Statistics ((PROMS,volume 139))

Abstract

Since the conception of the seminal work proposed by Eschenauer and Gligor in 2002, several key predistribution mechanisms have been proposed in the literature in order to establish symmetric secret keys between any two neighbor sensor nodes in wireless sensor networks (WSNs) for secure communication. However, due to lack of prior deployment knowledge, limited resources of sensor nodes and security threats posed in the unattended environment of WSNs, it is always a challenging task to propose a better secure key predistribution scheme apart from existing schemes. In this paper, we aim to propose two new key predistribution schemes based on hashed key chains, which provide secure communication between the sensor nodes with the desired storage and communication overheads. The proposed schemes provide better tradeoff among security, network connectivity, and overheads as compared to those for other existing schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38(4), 393–422 (2002)

    Article  Google Scholar 

  2. Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983)

    Article  MATH  MathSciNet  Google Scholar 

  3. Eschenauer, L., Gligor, V.D.: A key management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communication Security, pp. 41–47, Nov 2002

    Google Scholar 

  4. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, Berkeley, California (2003)

    Google Scholar 

  5. Castelluccia, C., Spognardi, A.R.: A robust key pre-distribution protocol for multi-phase wireless sensor networks. In: Proceedings of Third International Conference on Security and Privacy in Communication Networks (SecureComm’07), pp. 351–360 (2007)

    Google Scholar 

  6. Das, A.K., Giri, D.: An identity based key management scheme in wireless sensor networks. In: Proceedings of 4th Asian International Mobile Computing Conference (AMOC 2006), Kolkata, India, pp. 70–76. Tata McGrawHill Press, Kolkata (2006)

    Google Scholar 

  7. Kalkan, K., Yilmaz, S., Yilmaz, O.Z., Levi, A.: A highly resilient and zone-based key predistribution protocol for multiphase wireless sensor networks. In: Proceedings of the 5th ACM Symposium on QoS and Security for Wireless And Mobile Networks (Q2SWinet’09), pp. 29–36 (2009)

    Google Scholar 

  8. Unlu, A., Armagan, O., Levi, A., Savas, E., Ercetin O.: Key predistribution schemes for sensor networks for continuous deployment scenario. In: Proceedings of IFIP International Conferences on Networking (Networking 2007), Lecture Notes in Computer Science (LNCS), vol. 479, pp. 239–250 (2007)

    Google Scholar 

  9. Das, A.K.: An efficient random key distribution scheme for large-scale distributed sensor networks. Secur. Commun. Netw. 4(2), 162–180 (2011)

    Article  Google Scholar 

  10. Das, A.K.: A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks. Int. J. Inf. Secur. 11(3), 189–211 (2012)

    Article  Google Scholar 

  11. Das, A.K.: Improving Identity-based random key establishment scheme for large-scale hierarchical wireless sensor networks. Int. J. Netw. Secur. 14(1), 1–21 (2012)

    Google Scholar 

  12. Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of 10th ACM Conference on Computer and Communications Security (CCS), pp. 52–61. Washington DC, 27–31 Oct 2003

    Google Scholar 

  13. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, Nov 2003

    Google Scholar 

  14. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, D.: SPINS: security protocols for sensor networks. In: Proceedings of Seventh Annual International Conference on Mobile Computing and Networks, July 2001

    Google Scholar 

  15. Forouzan, B.A.: Cryptography and Network Security. Tata McGraw-Hill, New York (2007)

    Google Scholar 

  16. Das, A.K.: A location-adaptive key establishment scheme for large-scale distributed wireless sensor networks. J. Comput. 4(9), 896–904 (2009)

    Article  Google Scholar 

Download references

Acknowledgments

The authors would like to acknowledge the many helpful suggestions of the anonymous reviewers which have improved the content and the presentation of this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Prasun Hazra .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Hazra, P., Giri, D., Das, A.K. (2015). Key Chain-Based Key Predistribution Protocols for Securing Wireless Sensor Networks. In: Mohapatra, R., Chowdhury, D., Giri, D. (eds) Mathematics and Computing. Springer Proceedings in Mathematics & Statistics, vol 139. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2452-5_10

Download citation

Publish with us

Policies and ethics