Mobile Networks and Applications

, Volume 15, Issue 4, pp 517–529

Two-Tier, Scalable and Highly Resilient Key Predistribution Scheme for Location-Aware Wireless Sensor Network Deployments

Article

Abstract

We propose a probabilistic key predistribution scheme for wireless sensor networks, where keying materials are distributed to sensor nodes for secure communication. We use a two-tier approach in which there are two types of nodes: regular nodes and agent nodes. Agent nodes are more capable than regular nodes. Our node deployment model is zone-based such that the nodes that may end up with closer positions on ground are grouped together. The keying material of nodes that belong to different zones is non-overlapping. However, it is still possible for nodes that belong to different zones to communicate with each other via agent nodes when needed. We give a comparative analysis of our scheme through simulations and show that our scheme provides good connectivity figures at reasonable communication cost by using minimal flooding in key distribution. Moreover, we show that our scheme is scalable such that no extra overhead in incurred in case of increased number of nodes and sensor field size. Most importantly, simulation results show that our scheme is highly resilient to node captures.

Keywords

security authentication key management sensor networks resiliency against node capture attacks 

References

  1. 1.
    Eschenauer L, Gligor VD (2002) A key-management scheme for distributed sensor networks. Proceedings of the 9th ACM Conference on Computer and Communications Security, November 2002, pp 41–47Google Scholar
  2. 2.
    Blom R (1985) An optimal class of symmetric key generation system. Advances in Cryptology—Eurocrypt’84. LNCS, 209, 335–338. SpringerGoogle Scholar
  3. 3.
    Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) A survey on sensor networks. IEEE Commun Mag 40(8):102–114. doi:10.1109/MCOM.2002.1024422 CrossRefGoogle Scholar
  4. 4.
    Malan D (2004) Crypto for tiny objects. Harvard University Technical Report TR-04-04Google Scholar
  5. 5.
    Gaubatz G, Kaps J, Sunar B (2004) Public keys cryptography in sensor networks—revisited. Proceedings of the 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS), LNCS 3313:2–18, SpringerGoogle Scholar
  6. 6.
    Watro R, Kong D, Cuti S, Gardiner C, Lynn C, Kruus P (2004) Securing sensor networks with public key technology. Proceedings of the 2nd ACM Workshop on Security of Ad hoc and Sensor Networks, October 2004Google Scholar
  7. 7.
    Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. IEEE Symposium on Research in Security and Privacy 197–213Google Scholar
  8. 8.
    Du W, Deng J, Han YS, Chen S, Varshney P (2004) A key management scheme for wireless sensor networks using deployment knowledge. Proceedings of IEEE INFOCOM’04, March 2004Google Scholar
  9. 9.
    Du W, Deng J, Han YS, Varshney P (2003) A pairwise key predistribution scheme for wireless sensor networks. Proceedings of 10th ACM Conference on Computer and Communications Security (CCS’03), pp 42–51Google Scholar
  10. 10.
    Liu D, Ning P (2003) Establishing pairwise keys in distributed sensor networks. Proceedings of 10th ACM Conference on Computer and Communications Security (CCS’03), pp. 52–61, October 2003Google Scholar
  11. 11.
    Liu D, Ning P (2003) Location-based pairwise key establishments for static sensor networks. 2003 ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN ’03), pp. 72–82Google Scholar
  12. 12.
    Zhu S, Setia S, Jajodia S (2003) LEAP: Efficient security mechanisms for large-scale distributed sensor networks. Proceedings of 10th ACM Conference on Computer and Communications Security (CCS’03), pp. 62–72.Google Scholar
  13. 13.
    Anderson R, Kuhn M (1996) Tamper resistance—a cautionary note. Proceedings of the Second Usenix Workshop on Electronic Commerce, pp. 1–11Google Scholar
  14. 14.
    Lin HY, Pan DJ, Zhao XX, Qiu ZR (2008) A rapid and efficient pre-deployment key scheme for secure data transmissions in sensor networks using lagrange interpolation polynomial. International Journal of Security and its Applications 2(3):49–55Google Scholar
  15. 15.
    Liu D, Ning P, Du W (2005) Group-based key pre-distribution in wireless sensor networks, Proceedings of 2005 ACM Workshop on Wireless Security, September 2, 2005, Cologne, Germany pp. 11–20Google Scholar
  16. 16.
    Huang D, Mehta M, Medhi D, Harn L (2004) Location-aware key management scheme for wireless sensor networks, Proceedings of the 2nd ACM Workshop on Security of Ad hoc and Sensor Networks, October 2004, Washington, DC, USA, pp. 29–42Google Scholar
  17. 17.
    Zhou L, Ni J, Ravishankar CV (2005) Efficient key establishment for group-based wireless sensor deployments. Proceedings of 2005 ACM Workshop on Wireless Security, Sept. 2005, Cologne, Germany pp. 1–10Google Scholar
  18. 18.
    Shi E, Perrig A (2004) Designing secure sensor networks. IEEE Wirel Commun 11(6):38–43. doi:10.1109/MWC.2004.1368895 CrossRefGoogle Scholar
  19. 19.
    Unlu A, Levi A (2008) Two-tier, location-aware and highly resilient key predistribution scheme for wireless sensor networks, Proceedings of Visions of Computer Science—BCS International Academic Conference, London, UK, September 2008, pp. 355–366Google Scholar
  20. 20.
    Perrig A, Szewcyzk R, Wen V, Culler D, Tygar JD (2002) Spins: security protocols for sensor networks. Wirel Netw 8(5):521–534. doi:10.1023/A:1016598314198 MATHCrossRefGoogle Scholar
  21. 21.
    Dressler F (2008) Authenticated Reliable and Semi-reliable Communication in Wireless Sensor Networks. International Journal of Network Security 7(1):61–68Google Scholar
  22. 22.
    Levi A, Tasci SE, Lee YJ, Lee YJ, Bayramoglu E, Ergun M (2009) Simple, extensible and flexible random key predistribution schemes for wireless sensor networks using reusable key pools. Journal of Intelligent Manufacturing, accepted for publication. http://dx.doi.org/10.1007/s10845-009-0256-z

Copyright information

© Springer Science+Business Media, LLC 2009

Authors and Affiliations

  1. 1.Faculty of Engineering and Natural SciencesSabancı UniversityTuzlaTurkey

Personalised recommendations