Hierarchical-Structured Key Exchange Scheme for Large-Scale Mesh-Type Wireless Sensor Networks

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 330)

Abstract

The data that flows through wireless sensor networks is often private. Although data encryption is required, the calculation ability of each sensor node is weak. Therefore, common key encryption systems are suitable for sensor networks. To encrypt data using a common key, a key exchange scheme is required. For large-scale mesh-type wireless sensor networks, Key Pre-distribution Schemes have been used. However, this scheme involves some nodes that cannot perform key exchange. Moreover, as the number of stolen nodes increases, the analysis of the common key becomes easier. In this paper, we propose a novel key exchange scheme that does not include nodes that cannot perform key exchange. Even if many nodes are stolen, the proposed scheme ensures that the analysis of keys in other nodes is not possible, in the case where the attacker cannot intercept communication between any of them.

Keywords

Wireless Sensor Network key exchange scheme Key Predistribution Scheme 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Estrin, D., Govindan, R., Heidemann, J., Kumar, S.: Next century challenges: scalable coordination in sensor networks. In: Mobile Computing and Networking (Mobi- Com 1999), Seattle, WA, pp. 263–270 (1999)Google Scholar
  2. 2.
    Pottie, G.J., Kaiser, W.J.: Wireless integrated network sensors. Comm. ACM 43(5), 51–58 (2000)CrossRefGoogle Scholar
  3. 3.
    Eschenauer, L., Gligor, V.D.: A key management scheme for distributed sensor networks. In: Proc. of the 9th ACM Conf. on Computer and Communications Securitey, pp. 41–47 (2002)Google Scholar
  4. 4.
    Matsumoto, R., Mouri, H., Kaji, Y.: A pre-distribution scheme of keys for sensor nodes using small key pools. In: Symposium on Cryptography and Information Security 2006, vol. 3D4-4 (2006) (in Japanese)Google Scholar
  5. 5.
    Ito, T., Ohta, H., Matsuda, N., Yoneda, T.: A key pre-distribution scheme for secure sensor networks using probability density function of mode deployment. In: Proc. 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2005), pp. 69–75 (November 2005)Google Scholar
  6. 6.
    Chan, H., Perrig, A., Song, D.: Random key pre-distribution schemes for sensor networks. In: Proc. of the 24th IEEE Symp. on Security and Privacy, pp. 197–213 (2003)Google Scholar
  7. 7.
    Yukimaru, H., Kakizaki, Y., Iwamura, K.: Key management scheme applicable to various topologies of sensor networks. In: Proc. of Sixth International Conference on Availability, Reliability and Security (ARES 2011), pp. 448–453. IEEE CS (August 2011)Google Scholar
  8. 8.
    Chan, H., Perring, A.: PIKE: Peer intermediaries for key establishment in sensor networks. In: Proc. of IEEE Infocom, pp. 524–535 (2005)Google Scholar
  9. 9.
    Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanisms for large scale distributed sensor networks. In: ACM Conference on Computer and Communications Security, pp. 62–72 (2003)Google Scholar
  10. 10.
    Zhu, S., Jajodia, S.: LEAP+: efficient security mechanisms for large scale distributed sensor networks. ACM Transactions on Sensor Networks 2(4), 500–528 (2006)CrossRefGoogle Scholar
  11. 11.

Copyright information

© Springer-Verlag Berlin Heidelberg 2015

Authors and Affiliations

  1. 1.Tokyo University of ScienceKatushikaJapan

Personalised recommendations