Advertisement

Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Wireless Sensor Networks

  • Abedelaziz Mohaisen
  • Dae-Hun Nyang
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3868)

Abstract

Wireless Sensor Network (WSN) consists of huge number of sensor nodes which are small and inexpensive with very limited resources. The public key cryptography is undesirable to be used in WSN because of the limitations of the resources. A key management and predistribution techniques are required to apply the symmetric key cryptography in such a big network. Many key predistribution techniques and approaches have been proposed, but few of them considered the real WSN assumptions. In this paper, we propose a security framework that is based on a hierarchical grid for WSN considering the proper assumptions of the communication traffic and required connectivity. We apply simple keying material distribution scheme to measure the value of our framework. Finally, we provide security analysis for possible security threats in WSN.

Keywords

Sensor Network Sensor Node Network Order Hierarchical Grid Node Replication Attack 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: A Survey. Computer Networks Journal 38(4), 393–422 (2002)CrossRefGoogle Scholar
  2. 2.
    Blom, R.: An optimal class of symmetric key generation systems, Advances in Cryptography. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  3. 3.
    Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)Google Scholar
  4. 4.
    Camtepe, S.A., Yener, B.: Key Distribution Mechanisms for Wireless Sensor Networks: a Survey, Rensselaer Polytechnic Institute RPI, Technical Report TR-05-07 (March 23, 2005)Google Scholar
  5. 5.
    Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, May 2003, pp. 197–213 (2003)Google Scholar
  6. 6.
    Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inform. Theory IT-22, 644–654 (1976)CrossRefMathSciNetGoogle Scholar
  7. 7.
    Du, W., Deng, J., Han, Y.S., Varshney, P.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of 10th ACM Conf. on Computer and Communications Security (CCS 2003), pp. 42–51 (2003)Google Scholar
  8. 8.
    Eschenauer, L., Gligor, V.D.: A key management scheme for distributed sensor networks. In: Proceeding of the 9th ACM Conf. on Computer and Communications Security, pp. 41–47 (2002)Google Scholar
  9. 9.
    Huang, D., Mehta, M., Mehdi, D., Harm, L.: Location-aware Key Management Scheme for Wireless Sensor Networks. In: Proc. of 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2004), October 2004, pp. 29–42 (2004)Google Scholar
  10. 10.
    Hwang, J.M., Kim, Y.D.: Revisiting random key pre-distribution schemes for wireless sensor networks. In: Workshop on Security of ad hoc and Sensor Networks archive, Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 43–52 (2004)Google Scholar
  11. 11.
    Li, J., Janotti, J., DeCouto, D.S.J., Karger, D.R., Morris, R.: A Scalable Location Service for Geographic Ad Hoc Routing. In: The Sixth Annual International Conf. on Mobile Computing and Networking, August 2000, pp. 120–130 (2000)Google Scholar
  12. 12.
    Liu, D., Ning, P.: Establishing Pairwise keys in distributed sensor networks. In: Proceedings of 10th ACM Conf. on Computer and Communications Security (CCS 2003), pp. 52–61 (2003)Google Scholar
  13. 13.
    McCune, J., Shi, E., Perrig, A., Reiter, M.: Detection of Denial-of-Message Attacks on Sensor Network Broadcasts. In: Proceedings of the IEEE Symposium on Security and Privacy (May 2005)Google Scholar
  14. 14.
    Newsome, J., Shi, E., Song, D., Perrig, A.: The Sybil Attack in Sensor Networks: Analysis and Defense. In: Proceedings of Information Processing in Sensor Networks (IPSN) (April 2004)Google Scholar
  15. 15.
    Parno, B., Perrig, A., Gligor, V.: Distributed Detection of Node Replication Attacks in Sensor Networks. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy (May 2005)Google Scholar
  16. 16.
    Perrig, A., Szewczyk, R., Wen, V., Culler, D.E., Tygar, J.D.: SPINS: security protocols for sensor networks. In: MOBICOM, pp. 189–199 (2001)Google Scholar
  17. 17.
    Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1978)zbMATHCrossRefMathSciNetGoogle Scholar
  18. 18.
    Schmidt, J.S., Krahn, H., Fischer, S., Watjen, D.: A Security Architecture for Mobile Wireless Sensor Networks. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 166–177. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  19. 19.
    Wood, A., Stankovic, J.A.: Denial of Service in Sensor Networks. IEEE Computer 35(10), 54–62 (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Abedelaziz Mohaisen
    • 1
  • Dae-Hun Nyang
    • 1
  1. 1.Information Security Research Laboratory, Graduate School of IT & TelecommunicationsInha UniversityIncheonKorea

Personalised recommendations