Abstract
The most important problem in the security of wireless sensor network (WSN) is to distribute keys for the sensor nodes and to establish a secure channel in an insecure environment. Since the sensor node has limited resources, for instance, low battery life and low computational power, the key distribution scheme must be designed in an efficient manner. Recently many studies added a few high-level nodes into the network, called the heterogeneous sensor network (HSN). Most of these studies considered an application for two-level HSN instead of multi-level one. In this paper, we propose some definitions for multi-level HSN, and design a novel key management strategy based on the polynomial hash tree (PHT) method by using deployment knowledge. Our proposed strategy has lower computation and communication overheads but higher connectivity and resilience.
Similar content being viewed by others
References
Akyildiz I F, Su W, Sankarasubramamiam Y, et al. Wireless sensor networks: A survey [J]. Computer Networks, 2002, 38: 393–422.
Chan H, Gligor V D, Perrig A, et al. On the distribution and revocation of cryptographic keys in sensor networks [J]. IEEE Transactions on Dependable and Secure Computing, 2005, 2: 233–247.
Chan H, Perrig A H, Song D. Random key predistribution scheme for sensor networks [C]//Proceedings of IEEE Symposium Security and Privacy (SP′03). [s.l.]: IEEE, 2003: 197–213.
Chan H, Perrig A H, Song D H. Key distribution techniques for sensor networks, wireless sensor networks [M]. Norwell, MA, USA: Kluwer Academic Publishers, 2004: 277–303.
Du W, Deng J, Han Y S, et al. A key predistribution scheme for sensor networks using deployment knowledge [J]. IEEE Transactions on Dependable and Secure Computing, 2006, 3(1): 62–77.
Eschenauer L, Gligor V. A key management scheme for distributed sensor networks [C]//Proceedings of ACM Conference on Computer and Communications Security (CCS′02). Washington, DC, USA: ACM Press, 2002: 41–47.
Huang D, Mehta M, Van De Liefvoort A, et al. Modeling pairwise key establishment for random key predistribution in large-scale sensor networks [J]. IEEE/ACM Transactions on Networking, 2007, 15(5): 1204–1215.
Walters J P, Liang Z, Shi W, et al. Wireless sensor network security: A survey [C]// Security in Distributed, Grid, and Pervasive Computing. Exton, Pennsylvania, USA: CRC Press, 2006: 367–410.
Park T, Shin K G. LiSP: A lightweight security protocol for wireless sensor networks [J]. ACM Transactions on Embedded Computing Systems (TECS), 2004, 3: 634–660.
Pister K, Kahn J, Boser B. Smart dust [EB/OL]. (2009-06-01). http://robotics.eecs.berkeley.edu/~pister/SmartDust/.
Kauar F, Hussian S, Yang L T, et al. Scalable and efficient key management for heterogeneous sensor networks [J]. The Journal of Supercomputing, 2008, 45(1): 44–65.
Lu K, Qian Y, Hu J. A framework for distributed key management schemes in heterogeneous wireless sensor networks [C]//Proceedings of 25th IEEE International Performance, Computing, and Communications Conference, IPCCC 2006. [s.l.]: IEEE, 2006: 513–519.
Traynor P, Kumar R, Choi H, et al. Efficient hybrid security mechanisms for heterogeneous sensor networks [J]. IEEE Transactions on Mobile Computing, 2007, 6: 663–677.
Liu D, Ning P. Location-based pairwise key establishments for static sensor networks [C]//ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN ′03). [s.l.]: ACM Press, 2003: 72–82.
Yu Z, Guan Y. A key pre-distribution scheme using deployment knowledge for wireless sensor networks [C]//Proceedings of Fourth International Symposium on Information Processing in Sensor Networks. Piscataway, NJ, USA: IEEE, 2005: 261–268.
Liu D, Ning P. Establishing pairwise keys in distributed sensor networks [C]//Proceedings of 10th ACM Conference on Computer and Communications Security (CCS′03). Washington, DC, USA: ACM Press, 2003: 52–61.
Blundo C, Santis A D, Herzberg A, et al. Perfectly-secure key distribution for dynamic conferences [C]// Proceedings of Advances in Cryptology-CRYPTO′92, LNCS 740. California, USA: ACM Press, 1993: 471–486.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wang, Ch., Wei, Sy. Highly resilient key distribution strategy for multi-level heterogeneous sensor networks by using deployment knowledge. J. Shanghai Jiaotong Univ. (Sci.) 16, 593–599 (2011). https://doi.org/10.1007/s12204-011-1194-4
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12204-011-1194-4
Key words
- heterogeneous sensor network (HSN)
- key distribution mechanism
- deployment knowledge
- polynomial hash tree (PHT)