Skip to main content

MKPS: A Multi-level Key Pre-distribution Scheme for Secure Wireless Sensor Networks

  • Conference paper
Human-Computer Interaction. Interaction Platforms and Techniques (HCI 2007)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4551))

Included in the following conference series:

Abstract

Key distribution is one of the most challenging issues for secure communication in wireless sensor networks. Even though the random key pre-distribution approach is suitable for sensor nodes of low power and resource, a shared key between a pair of nodes is not guaranteed to be found and thus they cannot communicate with each other. This paper proposes a new robust key pre-distribution scheme solving this problem while security is not compromised even though the data exchanged between the nodes are tapped by an adversary. This is achieved by using the keys assigned through LDU decomposition of the symmetric matrix of a pool of keys. A general form solution of L, D, and U matrix is also developed to minimize the time overhead of LDU decomposition. Computer simulation reveals that the proposed scheme also significantly improves the energy efficiency compared with the existing random key pre-distribution scheme.

This research was supported by the Ubiquitous Autonomic Computing and Network Project, 21st Century Frontier R&D Program in Korea and the Brain Korea 21 Project in 2007. Corresponding author: Hee Yong Youn.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks: IEEE Communications Magazine 40(8), 102–114 (2002)

    Article  Google Scholar 

  2. Stajano, F.: Security for Ubiquitous Computing. John Wiley and Sons, Chichester (2002)

    Google Scholar 

  3. Carman, D.W., Kruus, P.S., Matt, B.J.: Constraints and approaches for distributed sensor network security: NAI Labs Technical Report #00-010 (2000)

    Google Scholar 

  4. Neuman, B.C., Tso, T.: Kerberos: An authentication service for computer networks. IEEE Communications 32(9), 33–38 (1994)

    Article  Google Scholar 

  5. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory 22, 644–654 (1976)

    Article  MATH  Google Scholar 

  6. Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)

    Article  MATH  Google Scholar 

  7. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communication security, pp. 41–47 (2002)

    Google Scholar 

  8. Anderson, R., Kuhn, M.: Tamper resistance – a cautionary note. In: Proceedings of the Second Usenix Workshop On Electronic Commerce, pp. 1–11 (1996)

    Google Scholar 

  9. Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 52–61 (2003)

    Google Scholar 

  10. Blundo, C., Santix, A.D., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)

    Google Scholar 

  11. Perrig, A., Szewczyk, R., Wen, V., Cullar, D., Tygar, J.D.: Spins (Security protocols for sensor networks). In: Proceedings of the 7th Annual ACM/IEEE International Conference on Mobile Computing and Networking(MobiCom), pp. 189–199 (2001)

    Google Scholar 

  12. Chan, H., Perrig, A., Song, D.: Random key pre-distribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, pp. 197–213 (2003)

    Google Scholar 

  13. Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks. In: Proceedings of the Hawaii International Conference on System Science, Maui, Hawaii, pp. 323–327 (2000)

    Google Scholar 

  14. Kim, K.T., Youn, H.Y.: Energy-Driven Adaptive Clustering Hierarchy (EDACH) for Wireless Sensor Networks. In: Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y., Yang, L.T. (eds.) Embedded and Ubiquitous Computing – EUC 2005 Workshops. LNCS, vol. 3823, pp. 1098–1107. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  15. Choi, S.J., Youn, H.Y.: An Efficient Key Pre-distribution Scheme for Secure Distributed Sensor Networks. In: Enokido, T., Yan, L., Xiao, B., Kim, D., Dai, Y., Yang, L.T. (eds.) Embedded and Ubiquitous Computing – EUC 2005 Workshops. LNCS, vol. 3823, pp. 1088–1097. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Julie A. Jacko

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Choi, S.J., Youn, H.Y. (2007). MKPS: A Multi-level Key Pre-distribution Scheme for Secure Wireless Sensor Networks. In: Jacko, J.A. (eds) Human-Computer Interaction. Interaction Platforms and Techniques. HCI 2007. Lecture Notes in Computer Science, vol 4551. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73107-8_89

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73107-8_89

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73106-1

  • Online ISBN: 978-3-540-73107-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics