Wireless Personal Communications

, Volume 99, Issue 4, pp 1541–1568 | Cite as

Deployment Based Attack Resistant Key Distribution with Non Overlapping Key Pools in WSN

Article
  • 53 Downloads

Abstract

Many current key management schemes do not effectively consider the attack probability and assume it to be same for every sensor node. However, for some applications like disaster management and military surveillance, attacks on sensor nodes may occur with different probabilities. In this paper, we have proposed a deployment based attack resistant key distribution for cellular model of wireless sensor networks. The main strength of the proposed scheme lies in incorporating the concepts such as the node density of the cell, the neighbor influence factor, gradient distance, placement of the sink node and the type of application running on the nodes to construct the attack matrix of each cell of the network. The domain key pool of the cell is further extended by the sharing of adjacent sub key pools followed by the hash computation on the keys and combining the hash computed keys with the original keys. This improves the probability of connectivity and storage overhead of the proposed scheme. To improve the resilience against the node capture attack and the communication overhead, the key pool is partitioned into three non overlapping sub key pools and the keys are hashed based on the cell and the node’s identifiers. It is also shown that the proposed scheme performs better in terms of the probability of connectivity and the computation overhead when compared with existing schemes.

Keywords

Random key predistribution Resilience against node capture attack Probability of connectivity Attack probability Wireless sensor networks 

References

  1. 1.
    He, X., Neidermeier, M., & Meer, H. (2013). Dynamic key management in wireless sensor network: A survey. Journal of Network and Computer Applications, 36, 612–622.CrossRefGoogle Scholar
  2. 2.
    Aikyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayir, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38(4), 393–422.CrossRefGoogle Scholar
  3. 3.
    Eschenauer, L., Gligor, V. (2002). A key-management scheme for distributed sensor networks. In Proceedings of 9th ACM conference on computer and communications security (pp. 41–47).Google Scholar
  4. 4.
    You, L., & Yuan, Y. (2014). A key Distribution scheme based on deployment knowledge and dual key pools. International Journal of Security and its Applications, 8, 1–16.CrossRefGoogle Scholar
  5. 5.
    Mohaisen, A., Nyang, D., & AbuHmed, T. (2008). Two-level key pool design-based random key pre-distribution in wireless sensor networks. KSII Transactions on Internet & Information Systems, 2(5), 220–238.CrossRefGoogle Scholar
  6. 6.
    Chan, H., Perrig, A., Song, D. (2003). Random key predistribution schemes for sensor networks. In Proceedings of 2003 IEEE symposium on security and privacy (pp. 197–213). California, USA.Google Scholar
  7. 7.
    Du, W., Deng, J., Han, Y., Chen, S., Varshney, P.K. (2004). A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of IEEE INFOCOM’04, 2004 (pp.586–597).Google Scholar
  8. 8.
    Liu, D., & Ning, P. (2003). Location-based pair wise key establishments for static sensor networks. In Proceedings of the 1st ACM workshop on security of ad hoc and sensor networks (pp. 72–82). ACM.Google Scholar
  9. 9.
    Liu, D., Ning, P., & Du, W. (2008). Group-based key predistribution for wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 4(2), 11.CrossRefGoogle Scholar
  10. 10.
    Simonova, K., Ling, A. C., & Wang, X. S. (2006). Location-aware key predistribution scheme for wide area wireless sensor networks. In Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks (pp. 157–168). ACM.Google Scholar
  11. 11.
    Bechkit, W., Challal, Y., & Bouabdallah, A. (2013). A new class of hash-chain based key pre-distribution schemes for WSN. Computer Communications, 36(3), 243–255.CrossRefGoogle Scholar
  12. 12.
    Bechkit, W., Bouabdallah, A., & Challal, Y. (2010). Enhancing resilience of probabilistic key pre-distribution schemes for WSNs through hash chaining. In Proceedings of the 17th ACM conference on computer and communications security (pp. 642–644). ACM.Google Scholar
  13. 13.
    You, L., Yuan, Y., Yu, W., & Wang, Q. (2015). A key distribution scheme for WSN based on hash chains and deployment knowledge. International Journal of Distributed Sensor Networks, 11(7), 640792.CrossRefGoogle Scholar
  14. 14.
    Yu, W. (2010). A pair wise key management scheme based on hash function for wireless sensor networks. In 2010 second international workshop on education technology and computer science (ETCS) (Vol. 2, pp. 198–201). IEEE.Google Scholar
  15. 15.
    Zhang, J., & Ding, Y. (2010, July). Pair wise key management scheme using sub key pool for wireless sensor networks. In 2010 second international conference on information technology and computer science (ITCS) (pp. 21–24). IEEE.Google Scholar
  16. 16.
    Zhang, J., Li, J., & Liu, X. (2009, January). An improved pair wise key management scheme for wireless sensor networks. In International symposium on computer network and multimedia technology, 2009. CNMT 2009 (pp. 1–4). IEEE.Google Scholar
  17. 17.
    Yum, D. H., & Lee, P. J. (2012). Exact formulae for resilience in random key predistribution schemes. IEEE Transactions on Wireless Communications, 11(5), 1638–1642.CrossRefGoogle Scholar
  18. 18.
    Sarimurat, S., & Levi, A. (2013). Hag: Hash graph based key predistribution scheme for multiphase wireless sensor networks. In IEEE international conference on communications (ICC), 2013 (pp. 2079–2083). IEEE.Google Scholar
  19. 19.
    Ruj, S., Nayak, A., & Stojmenovic, I. (2011) Key predistribution in wireless sensor networks when sensors are within communication range. In S. Nikoletseas & J. Rolim (Eds.), Theoretical aspects of distributed computing in sensor networks. Monographs in theoretical computer science. An EATCS series. Springer, Berlin.Google Scholar
  20. 20.
    Chen, X., Makki, K., Yen, K., & Pissinou, N. (2008). Attack distribution modeling and its applications in sensor network security. EURASIP Journal on Wireless Communications and Networking, 2008, 32.Google Scholar
  21. 21.
    Kalkan, K., Yilmaz, S., Yilmaz, O. Z., & Levi, A. (2009). A highly resilient and zone-based key predistribution protocol for multiphase wireless sensor networks. In Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks (pp. 29–36). ACM.Google Scholar
  22. 22.
    Kendall, E., Kendall, M., & Kendall, W. S. (2012). A generalised formula for calculating the resilience of random key predistribution schemes. IACR Cryptology ePrint Archive, 2012, 426.Google Scholar
  23. 23.
    Yu, C. M., Li, C. C., Lu, C. S., & Kuo, S. Y. (2011). An application-driven attack probability-based deterministic pair wise key pre-distribution scheme for non-uniformly deployed sensor networks. International Journal of Sensor Networks, 9(2), 89–106.CrossRefGoogle Scholar
  24. 24.
    Lin, C., Wu, G., Yu, C. W., & Yao, L. (2015). Maximizing destructiveness of node capture attack in wireless sensor networks. The Journal of Supercomputing, 71(8), 3181–3212.CrossRefGoogle Scholar
  25. 25.
    Yu, C. M., Li, C. C., Lu, C. S., Lee, D. T., & Kuo, S. Y. (2007, June). Attack probability based deterministic key predistribution mechanism for non-uniform sensor deployment. In 27th international conference on distributed computing systems workshops, 2007. ICDCSW’07. (pp. 18–18). IEEE.Google Scholar
  26. 26.
    Das, A. K. (2011). An efficient random key distribution scheme for large-scale distributed sensor networks. Security and Communication Networks, 4(2), 162–180.CrossRefGoogle Scholar
  27. 27.
    Ahlawat, P., & Dave, M. (2017). A hybrid approach for path vulnerability matrix on random key predistribution for wireless sensor networks. Wireless Personal Communications, 94(4), 3327–3353.CrossRefGoogle Scholar
  28. 28.
    Lin, C., & Wu, G. (2013). Enhancing the attacking efficiency of the node capture attack in WSN: A matrix approach. The Journal of Supercomputing, 66(2), 989–1007.CrossRefGoogle Scholar
  29. 29.
    Ergun, M., Levi, A., & Savas, E. (2010). Increasing resiliency in multi-phase wireless sensor networks: Generation wise key predistribution approach. The Computer Journal, 54(4), 602–616.CrossRefGoogle Scholar
  30. 30.
    Tsai, S. C., Tzeng, W. G., & Zhou, K. Y. (2009). Key establishment schemes against storage-bounded adversaries in wireless sensor networks. IEEE Transactions on Wireless Communications, 8(3), 1218–1222.CrossRefGoogle Scholar
  31. 31.
    Ehdaie, M., Alexiou, N., Attari, M. A., Aref, M. R., & Papadimitratos, P. (2015). Key splitting: Making random key distribution schemes resistant against node capture. Security and Communication Networks, 8(3), 431–445.CrossRefGoogle Scholar
  32. 32.
    Zhang, J., Cui, Q., & Yang, R. (2016). A hybrid establishment scheme for wireless sensor networks. International Journal of Security and its applications, 10, 411–422.CrossRefGoogle Scholar
  33. 33.
    Zhang, Y., Liang, J., Zheng, B., Jiang, S., & Chen, W. (2016). Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks. Sensors, 16(2), 170.CrossRefGoogle Scholar
  34. 34.
    Maleh, Y., Ezzati, A. (2016). An efficient key establishment protocol for wireless sensor networks. In E. Sabir, H. Medromi & M. Sadik (Eds.), Advances in ubiquitous networking. Lecture notes in electrical engineering, vol 366. Springer, SingaporeGoogle Scholar
  35. 35.
    Shah, K. A., & Jinwala, D. C. Novel Approach for Pre-distributing Keys in WSNs for Linear Infrastructure. Wireless Personal Communications, 1-17.Google Scholar
  36. 36.
    Lalitha, T., & Jayaprabha, S. (2016). Mobility based key management security scheme for wireless sensor networks. Wireless Personal Communications, 87(2), 349–367.CrossRefGoogle Scholar
  37. 37.
    Yao, W., Han, S., & Li, X. (2015). LKH++ based group key management scheme for wireless sensor network. Wireless Personal Communications, 83(4), 3057–3073.CrossRefGoogle Scholar
  38. 38.
    Prasad, N. R., & Alam, M. (2006). Security framework for wireless sensor networks. Wireless Personal Communications, 37(3–4), 455–469.CrossRefGoogle Scholar
  39. 39.
    Rahman, M., & Sampalli, S. (2015). An efficient pair wise and group key management protocol for wireless sensor network. Wireless Personal Communications, 84(3), 2035–2053.CrossRefGoogle Scholar
  40. 40.
    Son, J. H., Lee, J. S., & Seo, S. W. (2010). Topological key hierarchy for energy-efficient group key management in wireless sensor networks. Wireless Personal Communications, 52(2), 359–382.CrossRefGoogle Scholar
  41. 41.
    Shan, T. H., & Liu, C. M. (2008). Enhancing the key pre-distribution scheme on wireless sensor networks. In IEEE Asia-Pacific services computing conference, 2008. APSCC’08. (pp. 1127–1131). IEEE.Google Scholar
  42. 42.
    Dalai, D. K., & Sarkar, P. (2017). Hash chains sensornet: A key predistribution scheme for distributed sensor networks using nets and hash chains. Sensors & Transducers, 212(5), 39.Google Scholar
  43. 43.
    Modiri, V., Javadi, H. H. S., & Anzani, M. (2017). A novel scalable key pre-distribution scheme for wireless sensor networks based on residual design. Wireless Personal Communications, 96(2), 2821–2841.CrossRefGoogle Scholar
  44. 44.
    Mishra, A. K., & Turuk, A. K. (2011, February). Adversary information gathering model for node capture attack in wireless sensor networks. In 2011 international conference on devices and communications (ICDeCom) (pp. 1–5). IEEE.Google Scholar
  45. 45.
    Kavitha, T., & Sridharan, D. (2013). Probabilistic key chain based key distribution schemes for WSN. International Review on Computers and Software (IRECOS), 8(5), 1156–1169.Google Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of Computer EngineeringNational Institute of TechnologyKurukshetraIndia

Personalised recommendations