Advertisement

A Key Management Scheme for Large Scale Distributed Sensor Networks

  • Yong Ho Kim
  • Hwaseong Lee
  • Dong Hoon Lee
  • Jongin Lim
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4217)

Abstract

To guarantee secure communication in wireless sensor networks, secret keys should be securely established between sensor nodes. Recently, an efficient security mechanism was proposed for large-scale distributed sensor networks by Zhu, Setia, and Jajodia. In their scheme, each node uses a single initial key to establish pair-wise keys and erases the key after key setup. If the key is compromised during key setup, however, the entire network will be compromised. Therefore, the performance overhead during key setup is very important for the speedy key establishment. In this paper, we propose a modified scheme which reduces the performance overhead during key setup and has provable security after key setup.

Keywords

security key management wireless sensor networks 

References

  1. 1.
    Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. In: Proceedings of the IEEE Communications Magazine, vol. 40(8), pp. 102–114 (2002)Google Scholar
  2. 2.
    Bellare, M., Kilian, J., Rogaway, P.: The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences 61(3), 362–399 (2000)zbMATHCrossRefMathSciNetGoogle Scholar
  3. 3.
    Carman, D.W., Kruus, P.S., Matt, B.J.: Constraints and approaches for distributed sensor network security. NAI Labs Technical Report 00-010 (September 2000)Google Scholar
  4. 4.
    Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, May 2003, pp. 197–213 (2003)Google Scholar
  5. 5.
    Crossbow technology inc. URL: http://www.xbow.com
  6. 6.
    Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In: Proceedings of the IEEE INFOCOM 2004, pp. 586–597 (March 2004)Google Scholar
  7. 7.
    Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In: Proceedings of the ACM Transactions on Information and System Security, August 2005, pp. 228–258 (2005)Google Scholar
  8. 8.
    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and communications security (November 2002), pp. 41–47 (2002)Google Scholar
  9. 9.
    Liu, D., Ning, P., Li, R.: Establishing Pairwise Keys in Distributed Sensor Networks. In: Proceedings of the ACM Transactions on Information and System Security, February 2005, pp. 41–77 (2005)Google Scholar
  10. 10.
    Perrig, A., Szewczyk, R., Wen, V., Cullar, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. In: Proceedings of the 7th Annual ACM/IEEE Internation Conference on Mobile Computing and Networking (July 2001), pp. 189–199 (2001)Google Scholar
  11. 11.
    Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: Proceedings of the Tenth ACM conference on Computer and Communications Security (October 2003), pp. 62–72 (2003)Google Scholar
  12. 12.
    Zhu, S., Setia, S., Jajodia, S.: The technical report about LEAP, URL: (August 2004), http://www.cse.psu.edu/~szhu/research.htm

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Yong Ho Kim
    • 1
  • Hwaseong Lee
    • 1
  • Dong Hoon Lee
    • 1
  • Jongin Lim
    • 1
  1. 1.Center for Information Security Technologies (CIST)Korea UniversitySeoulKorea

Personalised recommendations