Using Auxiliary Sensors for Pairwise Key Establishment in WSN

  • Qi Dong
  • Donggang Liu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4479)

Abstract

Many techniques have been developed recently for establishing pairwise keys in sensor networks. However, they are either vulnerable to a few number of compromised sensor nodes or involve expensive protocols for establishing keys. This paper introduces a much better alternative for achieving high resilience to node compromises and high efficiency in key establishment. The main idea is to deploy additional sensor nodes, called assisting nodes, to help the key establishment between sensor nodes. The proposed approach has many advantages over existing approaches. In this approach, a sensor node only needs to make a few local contacts and perform a few hash operations to setup a key with any other sensor node in the network at a very high probability. The majority of sensor nodes only need to store a single key in their memory space. Besides these benefits, it still provides high resilience to node compromises. The implementation of this approach on TelosB motes also demonstrates its feasibility for pairwise key establishment in sensor networks.

Keywords

Key management pairwise keys sensor networks 

References

  1. 1.
    Perrig, A., et al.: SPINS: Security protocols for sensor networks. In: Proceedings of Seventh Annual International Conference on Mobile Computing and Networks (July 2001)Google Scholar
  2. 2.
    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, November 2002, pp. 41–47. ACM Press, New York (2002)Google Scholar
  3. 3.
    Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Research in Security and Privacy, pp. 197–213. IEEE Computer Society Press, Los Alamitos (2003)Google Scholar
  4. 4.
    Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of 10th ACM Conference on Computer and Communications Security (CCS’03), October 2003, pp. 52–61. ACM Press, New York (2003)Google Scholar
  5. 5.
    Du, W., et al.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of 10th ACM Conference on Computer and Communications Security (CCS’03), October 2003, pp. 42–51. ACM Press, New York (2003)Google Scholar
  6. 6.
    Chan, H., Perrig, A.: PIKE: Peer intermediaries for key establishment in sensor networks. In: Proceedings of IEEE Infocom, IEEE Computer Society Press, Los Alamitos (2005)Google Scholar
  7. 7.
    Du, W., et al.: A key management scheme for wireless sensor networks using deployment knowledge. In: Proceedings of IEEE INFOCOM’04, March 2004, IEEE Computer Society Press, Los Alamitos (2004)Google Scholar
  8. 8.
    Liu, D., Ning, P.: Location-based pairwise key establishments for static sensor networks. In: 2003 ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN ’03), October 2003, pp. 72–82. ACM Press, New York (2003)Google Scholar
  9. 9.
    Liu, D., Ning, P.: Improving key pre-distribution with deployment knowledge in static sensor networks. ACM Transaction on Sensor Networks (TOSN) 1(2) (2005)Google Scholar
  10. 10.
    Yu, Z., Guan, Y.: A key pre-distribution scheme using deployment knowledge for wireless sensor networks. In: Proceedings of ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), April 2005, IEEE Computer Society Press, Los Alamitos (2005)Google Scholar
  11. 11.
    Huang, D., et al.: Location-aware key management scheme for wireless sensor networks. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks (SASN ’04), October 2004, pp. 29–42. ACM Press, New York (2004)CrossRefGoogle Scholar
  12. 12.
    Crossbow Technology Inc.: Wireless sensor networks. http://www.xbow.com/Products/Wireless_Sensor_Networks.htm Accessed in February 2006
  13. 13.
    Akyildiz, I.F., et al.: Wireless sensor networks: A survey. Computer Networks 38(4), 393–422 (2002)CrossRefGoogle Scholar
  14. 14.
    Hartung, C., Balasalle, J., Han, R.: Node compromise in sensor networks: The need for secure systems. Technical Report CU-CS-990-05, U. Colorado at Boulder (Jan. 2005)Google Scholar
  15. 15.
    Mathur, G., et al.: Ultra-low power data storage for sensor networks. In: Information Processing in Sensor Networks, 2006(IPSN 2006) (April 2006)Google Scholar
  16. 16.
    Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Commun. ACM 21(12), 993–999 (1978), doi:10.1145/359657.359659CrossRefMATHGoogle Scholar
  17. 17.
    Hill, J., et al.: System architecture directions for networked sensors. In: Architectural Support for Programming Languages and Operating Systems, pp. 93–104 (2000)Google Scholar
  18. 18.
    Rivest, R.: The RC5 encryption algorithm. In: Anderson, R. (ed.) FSE 1993. LNCS, vol. 809, pp. 86–96. Springer, Heidelberg (1994)Google Scholar
  19. 19.
    Liu, D., Ning, P.: Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In: Proceedings of the 10th Annual Network and Distributed System Security Symposium (NDSS’03), February 2003, pp. 263–276 (2003)Google Scholar
  20. 20.
    Basagni, S., et al.: Secure pebblenets. In: Proceedings of ACM International Symposium on Mobile ad hoc networking and computing, pp. 156–163. ACM Press, New York (2001)CrossRefGoogle Scholar
  21. 21.
    Przydatek, B., Song, D., Perrig, A.: SIA: Secure information aggregation in sensor networks. In: Proceedings of the First ACM Conference on Embedded Networked Sensor Systems (SenSys ’03), Nov. 2003, ACM Press, New York (2003)Google Scholar
  22. 22.
    Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. IEEE Computer 35(10), 54–62 (2002)CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2007

Authors and Affiliations

  • Qi Dong
    • 1
  • Donggang Liu
    • 1
  1. 1.Department of Computer Science and Engineering, The University of Texas at Arlington, Box 19015, Arlington, Texas 76019-0015USA

Personalised recommendations