Achieving Fast Self Healing in Wireless Sensor Networks Using Multi-generation Deployment Schemes

  • Ömer Zekvan Yılmaz
  • Albert Levi
  • Erkay Savaş
Part of the Communications in Computer and Information Science book series (CCIS, volume 48)


The majority of studies on security in resource limited wireless sensor networks (WSN) focus on finding an efficient balance among energy consumption, computational speed and memory usage. Besides these resources, time is a relatively immature aspect that can be considered in system design and performance evaluations. In a recent study by Castelluccia and Spognardi , the time dimension is used to lower the ratio of compromised links, thus, improving resiliency in key distribution in WSNs. This is achieved by making the old and possibly compromised keys useful only for a limited amount of time. In this way, the effect of compromised keys diminish in time, so the WSN selfheals. In this study we further manipulate the time dimension and propose a deployment model that speeds up the resilience improvement process with a tradeoff between connectivity and resiliency. In our method, self healing speeds up by introducing nodes that belong to future generations in the time scale. In this way, the duration that the adversary can make use of compromised keys become smaller.


Sensor Node Wireless Sensor Network Anchor Node Local Connectivity Active Link 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks 38(4), 393–422 (2002)CrossRefGoogle Scholar
  2. 2.
    Anjum, F.: Location dependent key management using random key-predistribution in sensor networks. In: WiSe 2006: Proceedings of the 5th ACM workshop on Wireless security, pp. 21–30. ACM Press, New York (2006)CrossRefGoogle Scholar
  3. 3.
    Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  4. 4.
    Camtepe, S., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks (2004)Google Scholar
  5. 5.
    Castelluccia, C., Spognardi, A.: Rok: A robust key pre-distribution protocol for multi-phase wireless sens or networks. In: SecureComm 2007, Third International Conference on Security and Privacy in Communication Networks (2007)Google Scholar
  6. 6.
    Chan, H., Perrig, A.: Pike: peer intermediaries for key establishment in sensor networks. In: Proceedings IEEE, INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. (2005)Google Scholar
  7. 7.
    Dong, Q., Liu, D.: Using auxiliary sensors for pairwise key establishment in WSN. In: Akyildiz, I.F., Sivakumar, R., Ekici, E., Oliveira, J.C.d., McNair, J. (eds.) NETWORKING 2007. LNCS, vol. 4479, pp. 251–262. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  8. 8.
    Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: CCS 2003: Proceedings of the 10th ACM conference on Computer and communications security, pp. 42–51. ACM, New York (2003)CrossRefGoogle Scholar
  9. 9.
    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: CCS 2002: Proceedings of the 9th ACM conference on Computer and communications security, pp. 41–47. ACM, New York (2002)CrossRefGoogle Scholar
  10. 10.
    Lu, K., Qian, Y., Hu, J.: A framework for distributed key management schemes in heterogeneous wireless sensor networks. In: IPCCC 2006, 25th IEEE International Performance, Computing, and Communications Conference (2006)Google Scholar
  11. 11.
    Mehta, M., Huang, D., Harn, L.: Rink-rkp: a scheme for key predistribution and shared-key discovery in sensor networks. In: IPCCC 2005, Proc. 24th IEEE Int’l. Performance, Computing, and Comm. Conf. (2005)Google Scholar
  12. 12.
    Yang, C., Zhou, J., Zhang, W., Wong, J.: Pairwise Key Establisment for Large-scale Sensor Networks: from Identifier-based to Location-based. In: ACM International Conference Proceeding Series Proceedings of the 1st international conference on Scalable information systems (2006)Google Scholar
  13. 13.
    Yu, Z., Guan, Y.: A key pre-distribution scheme using deployment knowledge for wireless sensor networks. In: IPSN 2005: Proceedings of the 4th international symposium on Information processing in sensor networks, Piscataway, NJ, USA, p. 35. IEEE Press, Los Alamitos (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Ömer Zekvan Yılmaz
    • 1
    • 2
  • Albert Levi
    • 1
  • Erkay Savaş
    • 1
  1. 1.Sabancı University, TuzlaİstanbulTurkey
  2. 2.TÜBİTAK UEKAE, GebzeKocaeliTurkey

Personalised recommendations