Skip to main content
Log in

Highly resilient key distribution strategy for multi-level heterogeneous sensor networks by using deployment knowledge

  • Published:
Journal of Shanghai Jiaotong University (Science) Aims and scope Submit manuscript

Abstract

The most important problem in the security of wireless sensor network (WSN) is to distribute keys for the sensor nodes and to establish a secure channel in an insecure environment. Since the sensor node has limited resources, for instance, low battery life and low computational power, the key distribution scheme must be designed in an efficient manner. Recently many studies added a few high-level nodes into the network, called the heterogeneous sensor network (HSN). Most of these studies considered an application for two-level HSN instead of multi-level one. In this paper, we propose some definitions for multi-level HSN, and design a novel key management strategy based on the polynomial hash tree (PHT) method by using deployment knowledge. Our proposed strategy has lower computation and communication overheads but higher connectivity and resilience.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Akyildiz I F, Su W, Sankarasubramamiam Y, et al. Wireless sensor networks: A survey [J]. Computer Networks, 2002, 38: 393–422.

    Article  Google Scholar 

  2. Chan H, Gligor V D, Perrig A, et al. On the distribution and revocation of cryptographic keys in sensor networks [J]. IEEE Transactions on Dependable and Secure Computing, 2005, 2: 233–247.

    Article  Google Scholar 

  3. Chan H, Perrig A H, Song D. Random key predistribution scheme for sensor networks [C]//Proceedings of IEEE Symposium Security and Privacy (SP′03). [s.l.]: IEEE, 2003: 197–213.

  4. Chan H, Perrig A H, Song D H. Key distribution techniques for sensor networks, wireless sensor networks [M]. Norwell, MA, USA: Kluwer Academic Publishers, 2004: 277–303.

    Google Scholar 

  5. Du W, Deng J, Han Y S, et al. A key predistribution scheme for sensor networks using deployment knowledge [J]. IEEE Transactions on Dependable and Secure Computing, 2006, 3(1): 62–77.

    Article  Google Scholar 

  6. Eschenauer L, Gligor V. A key management scheme for distributed sensor networks [C]//Proceedings of ACM Conference on Computer and Communications Security (CCS′02). Washington, DC, USA: ACM Press, 2002: 41–47.

    Google Scholar 

  7. Huang D, Mehta M, Van De Liefvoort A, et al. Modeling pairwise key establishment for random key predistribution in large-scale sensor networks [J]. IEEE/ACM Transactions on Networking, 2007, 15(5): 1204–1215.

    Article  Google Scholar 

  8. Walters J P, Liang Z, Shi W, et al. Wireless sensor network security: A survey [C]// Security in Distributed, Grid, and Pervasive Computing. Exton, Pennsylvania, USA: CRC Press, 2006: 367–410.

    Google Scholar 

  9. Park T, Shin K G. LiSP: A lightweight security protocol for wireless sensor networks [J]. ACM Transactions on Embedded Computing Systems (TECS), 2004, 3: 634–660.

    Article  MathSciNet  Google Scholar 

  10. Pister K, Kahn J, Boser B. Smart dust [EB/OL]. (2009-06-01). http://robotics.eecs.berkeley.edu/~pister/SmartDust/.

  11. Kauar F, Hussian S, Yang L T, et al. Scalable and efficient key management for heterogeneous sensor networks [J]. The Journal of Supercomputing, 2008, 45(1): 44–65.

    Article  Google Scholar 

  12. Lu K, Qian Y, Hu J. A framework for distributed key management schemes in heterogeneous wireless sensor networks [C]//Proceedings of 25th IEEE International Performance, Computing, and Communications Conference, IPCCC 2006. [s.l.]: IEEE, 2006: 513–519.

    Google Scholar 

  13. Traynor P, Kumar R, Choi H, et al. Efficient hybrid security mechanisms for heterogeneous sensor networks [J]. IEEE Transactions on Mobile Computing, 2007, 6: 663–677.

    Article  Google Scholar 

  14. Liu D, Ning P. Location-based pairwise key establishments for static sensor networks [C]//ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN ′03). [s.l.]: ACM Press, 2003: 72–82.

    Chapter  Google Scholar 

  15. Yu Z, Guan Y. A key pre-distribution scheme using deployment knowledge for wireless sensor networks [C]//Proceedings of Fourth International Symposium on Information Processing in Sensor Networks. Piscataway, NJ, USA: IEEE, 2005: 261–268.

    Google Scholar 

  16. Liu D, Ning P. Establishing pairwise keys in distributed sensor networks [C]//Proceedings of 10th ACM Conference on Computer and Communications Security (CCS′03). Washington, DC, USA: ACM Press, 2003: 52–61.

    Chapter  Google Scholar 

  17. Blundo C, Santis A D, Herzberg A, et al. Perfectly-secure key distribution for dynamic conferences [C]// Proceedings of Advances in Cryptology-CRYPTO′92, LNCS 740. California, USA: ACM Press, 1993: 471–486.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chih-hung Wang  (王智弘).

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wang, Ch., Wei, Sy. Highly resilient key distribution strategy for multi-level heterogeneous sensor networks by using deployment knowledge. J. Shanghai Jiaotong Univ. (Sci.) 16, 593–599 (2011). https://doi.org/10.1007/s12204-011-1194-4

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12204-011-1194-4

Key words

CLC number

Navigation