Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios

  • Cristina Alcaraz
  • Rodrigo Roman
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4347)


It is commonly agreed that Wireless Sensor Networks (WSN) is one of the technologies that better fulfills features like the ones required by Critical (Information) Infrastructures. However, a sensor network is highly vulnerable against any external or internal attacks, thus network designers must know which are the tools that they can use in order to avoid such problems. In this paper we describe in detail a procedure (the KMS Guidelines), developed under our CRISIS project, that allows network designers to choose a certain Key Management System, or at least to know which protocol need to improve in order to satisfy the network requirements.


Critical Information Infrastructures Sensor Networks Key Management Key Infrastructures 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Commission of the European Communities. Communication from the Commission to the Council and the European Parliament: Critical Infrastructure Protection in the Fight Against Terrorism, COM (2004) 702 final, Brussels, October 20 (2004)Google Scholar
  2. 2.
    Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks: The International Journal of Computer and Telecommunications Networking 38(4), 393–422 (2002)Google Scholar
  3. 3.
    2004 US National Plan for Research and Development in Support for CIP, April 8 (2005), retrieved from:
  4. 4.
    Bopping, D.: CIIP in Australia. In: 1st CI2RCO Critical Information Infrastructure Protection conference, Rome (March 2006)Google Scholar
  5. 5.
    Crossbow Technology, Inc. Wireless Measurement Systems,
  6. 6.
    Lopez, J., Montenegro, J.A., Roman, R.: Service-Oriented Security Architecture for CII based on Sensor Networks. In: 2nd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), Lyon (France) (June 2006)Google Scholar
  7. 7.
    Camtepe, A., Yener, B.: Key distribution mechanisms for wireless sensor networks: a survey. Rensselaer Polytechnic Institute, Computer Science Department, Tech. Rep. 05-07 (March 2005)Google Scholar
  8. 8.
    Karlof, C., Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. In: Proceedings of 2nd International Conference on Embedded Networked Sensor Systems (SensSys 2004) (November 2004)Google Scholar
  9. 9.
    Moteiv Corporation,
  10. 10.
    Smart Infrastructure. The Cambridge-MIT Institute,
  11. 11.
  12. 12.
    Distributed Intelligence, Sensing and Coordination in Variable Environments. CSIRO,
  13. 13.
    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and communications security (CCS 2002), pp. 41–47. ACM Press, New York (2002)CrossRefGoogle Scholar
  14. 14.
    Du, W., Deng, J., Han, Y.S., Varshney, P.: A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge. IEEE Transactions on Dependable and Secure Computing 3(2), 62–77 (2006)Google Scholar
  15. 15.
    Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM conference on Computer and communications security (CCS 2003), pp. 42–51. ACM Press, New York (2003)CrossRefGoogle Scholar
  16. 16.
    Pietro, R.D., Mancini, L.V., Mei, A.: Random key-assignment for secure Wireless Sensor Networks. In: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (SASN 2003), pp. 62–71. ACM Press, New York (2003)CrossRefGoogle Scholar
  17. 17.
    Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: 2003 IEEE Symposium on Security and Privacy, May 2003, pp. 197–213 (2003)Google Scholar
  18. 18.
    Lee, J., Stinson, D.R.: Deterministic Key Predistribution Schemes for Distributed Networks. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 294–307. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  19. 19.
    Liu, D., Ning, P., Li, R.: Establishing Pairwise Keys in Distributed Sensor Networks. ACM Transactions on Information and System Security 8(1), 41–77 (2005)CrossRefGoogle Scholar
  20. 20.
    Anderson, R.J., Chan, H., Perrig, A.: Key Infection: Smart Trust for Smart Dust. In: Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004), October 2004, pp. 206–215 (2004)Google Scholar
  21. 21.
    Liu, D., Ning, P.: Improving Key Pre-Distribution with Deployment Knowledge in Static Sensor Networks. ACM Transactions on Sensor Networks (TOSN) 1(2), 204–239 (2005)CrossRefGoogle Scholar
  22. 22.
    Camtepe, A., Yener, B.: Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 293–308. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  23. 23.
    Hwang, D.D., Charles Lai, B., Verbauwhede, I.: Energy-Memory-Security Tradeoffs in Distributed Sensor Networks. In: Nikolaidis, I., Barbeau, M., Kranakis, E. (eds.) ADHOC-NOW 2004. LNCS, vol. 3158. Springer, Heidelberg (2004)Google Scholar
  24. 24.
    Hwang, J., Kim, Y.: Revisiting Random Key Pre-distribution Schemes for Wireless Sensor Networks. In: Proceedings of the 2nd ACM workshop on Security of Ad Hoc and Sensor Networks (SASN 2004), pp. 43–52. ACM Press, New York (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Cristina Alcaraz
    • 1
  • Rodrigo Roman
    • 1
  1. 1.Computer Science DepartmentUniversity of MalagaMalagaSpain

Personalised recommendations