A Key Management Scheme with Encoding and Improved Security for Wireless Sensor Networks

  • Al-Sakib Khan Pathan
  • Tran Thanh Dai
  • Choong Seon Hong
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4317)

Abstract

Wireless sensor networks are emerging as a promising solution for various types of futuristic applications both for military and public. Security in wireless sensor networks is very crucial as these networks are expected mainly to operate in the hazardous and hostile environments. Efficient key management could guarantee authenticity and confidentiality of the data exchanged among the nodes in the network. In this paper, we propose an improved and efficient key pre-distribution scheme for wireless sensor networks. Our scheme significantly increases the storage efficiency and security than that of the previously proposed scheme based on LU decomposition. It also ensures node-to-node mutual authentication in a way that an eavesdropper cannot harm the network by monitoring the traffic flows in the network. We also present detailed performance analysis and compare our scheme with the existing schemes.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s Ad Hoc Network Journal, Special Issue on Sensor Network Applications and Protocols, 293–315 (September 2003)Google Scholar
  2. 2.
    Pathan, A.-S.K., Lee, H.-W., Hong, C.S.: Security in Wireless Sensor Networks: Issues and Challenges. In: Proceedings of the 8th IEEE ICACT 2006, Phoenix Park, Korea, February 20-22, 2006, vol. II, pp. 1043–1048 (2006)Google Scholar
  3. 3.
    Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. Wireless Networks 8(5), 521–534 (2002)MATHCrossRefGoogle Scholar
  4. 4.
    Jolly, G., Kuscu, M.C., Kokate, P., Younis, M.: A Low-Energy Key Management Protocol for Wireless Sensor Networks. In: Proc. Eighth IEEE ISCC 2003, vol. 1, pp. 335–340 (2003)Google Scholar
  5. 5.
    Rabaey, J.M., Ammer, J., Karalar, T., Li, S., Otis, B., Sheets, M., Tuan, T.: PicoRadios for wireless sensor networks: the next challenge in ultra-low power design. In: IEEE ISSCC 2002, February 3-7, 2002, vol. 1, pp. 200–201 (2002)Google Scholar
  6. 6.
    Hollar, S.: COTS Dust. Master’s Thesis, Electrical Engineering and Computer Science Department, UC Berkeley (2000)Google Scholar
  7. 7.
    Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proc. 2003 IEEE Symposium on Security and Privacy, May 11-14, 2003, pp. 197–213 (2003)Google Scholar
  8. 8.
    Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A Pairwise Key Predistribution Scheme for Wireless Sensor Networks. ACM Transactions on Information and System Security 8(2), 228–258 (2005)CrossRefGoogle Scholar
  9. 9.
    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and Communications, Washington, DC, USA, November 18-22, 2002, pp. 41–47 (2002)Google Scholar
  10. 10.
    Liu, D., Ning, P., Li, R.: Establishing Pairwise Keys in Distributed Sensor Networks. ACM Transactions on Information and System Security 8(1), 41–77 (2005)CrossRefGoogle Scholar
  11. 11.
    Choi, S., Youn, H.: An Efficient Key Pre-distribution Scheme for Secure Distributed Sensor Networks. In: Enokido, T., Yan, L., Xiao, B., Kim, D.Y., Dai, Y.-S., Yang, L.T. (eds.) EUC-WS 2005. LNCS, vol. 3823, pp. 1088–1097. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  12. 12.
    Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies. INFOCOM 2004, March 7-11, 2004, vol. 1, pp. 586–597 (2004)Google Scholar
  13. 13.
    Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  14. 14.
    Blundo, C., Santis, A.D., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)Google Scholar
  15. 15.
    Zarowski, C.J.: An Introduction to Numerical Analysis for Electrical and Computer Engineers. John Wiley & Sons, Hoboken (2004)MATHCrossRefGoogle Scholar
  16. 16.
    Nakos, G., Joyner, D.: Linear Algebra with Applications, pp. 188–194. Brooks/Cole, USA (1998)Google Scholar
  17. 17.
    Birkhauser, Linear Algebra, Birkhauser Boston, pp. 33–37 (1997)Google Scholar
  18. 18.
    Douceur, J.: The Sybil Attack. In: 1st International Workshop on Peer-to-Peer Systems (2002)Google Scholar
  19. 19.
    Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: Proc. of the third international symposium on Information processing in sensor networks, pp. 259–268. ACM, New York (2004)CrossRefGoogle Scholar
  20. 20.
    Menezes, A., Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Al-Sakib Khan Pathan
    • 1
  • Tran Thanh Dai
    • 1
  • Choong Seon Hong
    • 1
  1. 1.Networking Lab, Department of Computer EngineeringKyung Hee UniversityYonginSouth Korea

Personalised recommendations