KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks

  • Zheng Gong
  • Qiang Tang
  • Yee Wei Law
  • Hongyang Chen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6584)


The constrained resources of sensors restrict the design of a key management scheme for wireless sensor networks (WSNs). In this work, we first formalize the security model of ALwEN, which is a gossip-based wireless medical sensor network (WMSN) for ambient assisted living. Our security model considers the node capture, the gossip-based network and the revocation problems, which should be valuable for ALwEN-like applications. Based on Shamir’s secret sharing technique, we then propose two key management schemes for ALwEN, namely the KALwEN+ schemes, which are proven with the security properties defined in the security model. The KALwEN+ schemes not only fit ALwEN, but also can be tailored to other scalable wireless sensor networks based on gossiping.


Wireless medical sensor network Gossiping Key management 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    AAL. European union. the ambient assisted living (aal) joint programme (January 2008),
  2. 2.
    ALwEN. Ambient living with embedded networks (January 2010),
  3. 3.
    Anderson, R.: A security policy model for clinical information systems. In: IEEE Symposium on Security and Privacy, pp. 30–43 (1996)Google Scholar
  4. 4.
    Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232–249. Springer, Heidelberg (1994)CrossRefGoogle Scholar
  5. 5.
    Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory IT-22(6), 644–654 (1976)MathSciNetCrossRefzbMATHGoogle Scholar
  6. 6.
    Dutta, R., Chang, E.-C., Mukhopadhyay, S.: Efficient self-healing key distribution with revocation for wireless sensor networks using one way key chains. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 385–400. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  7. 7.
    Dutta, R., Mukhopadhyay, S., Dowling, T.: Generalized self-healing key distribution in wireless adhoc networks with trade-offs in user’s pre-arranged life cycle and collusion resistance. In: Q2SWinet 2009: Proceedings of the 5th ACM Symposium on QoS and Security for Wireless and Mobile Networks, pp. 80–87. ACM Press, New York (2009)Google Scholar
  8. 8.
    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: CCS 2002: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47. ACM, New York (2002)Google Scholar
  9. 9.
    Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. J. ACM 33(4), 792–807 (1986)MathSciNetCrossRefzbMATHGoogle Scholar
  10. 10.
    Haas, Z.J., Halpern, J.Y., Li, L.: Gossip-based ad hoc routing. IEEE/ACM Transactions on Networking (TON) 14(3), 479–491 (2006)CrossRefGoogle Scholar
  11. 11.
    Halperin, D., Heydt-Benjamin, T.S., Ransford, B., Clark, S.S., Defend, B., Morgan, W., Fu, K., Kohno, T., Maisel, W.H.: Pacemakers and implantable cardiac defibrillators: Software radio attacks and Zero-Power defenses. In: 29th IEEE Symposium on Security and Privacy, Oakland, California, pp. 129–142. IEEE Computer Society, Los Alamitos (2008)Google Scholar
  12. 12.
    Kausar, F., Hussain, S., Park, J.H., Masood, A.: Secure group communication with self-healing and rekeying in wireless sensor networks. In: Zhang, H., Olariu, S., Cao, J., Johnson, D.B. (eds.) MSN 2007. LNCS, vol. 4864, pp. 737–748. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  13. 13.
    Khalili, A., Katz, J., Arbaugh, W.A.: Toward secure key distribution in truly ad-hoc networks. In: IEEE/IPSJ International Symposium on Applications and the Internet Workshops, p. 342 (2003)Google Scholar
  14. 14.
    Law, Y., Moniava, G., Gong, Z., Hartel, P., Palaniswami, M.: KALwEN: A New Practical and Interoperable Key Management Scheme for Body Sensor Networks. In: Security and Communication Networks (2010) (in press)Google Scholar
  15. 15.
    Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)zbMATHGoogle Scholar
  16. 16.
    Oliveira, L.B., Wong, H.C., Bern, M., Dahab, R., Loureiro, A.A.F.: Secleach - a random key distribution solution for securing clustered sensor networks. In: IEEE International Symposium on Network Computing and Applications, pp. 145–154 (2006)Google Scholar
  17. 17.
    Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)MathSciNetCrossRefzbMATHGoogle Scholar
  18. 18.
    Shoup, V.: Sequences of games: a tool for taming complexity in security proofs (2006),
  19. 19.
    Yang, G.Z.: Body Sensor Network. Springer, London (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Zheng Gong
    • 1
  • Qiang Tang
    • 1
  • Yee Wei Law
    • 2
  • Hongyang Chen
    • 3
  1. 1.Faculty of EWIUniversity of TwenteThe Netherlands
  2. 2.Department of EEEThe University of MelbourneAustralia
  3. 3.Institute of Industrial ScienceThe University of TokyoJapan

Personalised recommendations