Advertisement

Key Management for Mobile Sensor Networks

  • David Sánchez Sánchez
  • Heribert Baldus
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4074)

Abstract

Key management is paramount for mobile sensor network (MSN) security. The special nature of MSNs imposes challenging requirements on key management design. We evaluate current key management techniques proposed for wireless sensor networks in the context of MSNs and identify open issues for future research. We also propose a novel approach to control and replace pool-based pre-distributed keys. The analysis in this paper shows that this approach keeps the initial connectivity and resiliency properties of the key pre-distribution scheme even when nodes and keys are revoked.

Keywords

Sensor Network Sensor Node Wireless Sensor Network Intrusion Detection System Trusted Third Party 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  2. 2.
    Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-Secure Key Distribution for Dynamic Conferences, pp. 471–486 (1992)Google Scholar
  3. 3.
    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: ACM Conference on Computer and Communications Security, pp. 41–47 (2002)Google Scholar
  4. 4.
    Chan, H., Perrig, A., Song, D.X.: Random Key Predistribution Schemes for Sensor Networks. In: IEEE Symposium on Security and Privacy, p. 197 (2003)Google Scholar
  5. 5.
    Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: ACM Conference on Computer and Communications Security, pp. 42–51 (2003)Google Scholar
  6. 6.
    Liu, D., Ning, P., Li, R.: Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur., 41–77 (2005)Google Scholar
  7. 7.
    Hwang, Kim, Y.: Revisiting random key pre-distribution schemes for wireless sensor networks. In: Proc. of the 2nd ACM SASN workshop, pp. 43–52 (2004)Google Scholar
  8. 8.
    Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: ACM CCS Conference, pp. 62–72 (2003)Google Scholar
  9. 9.
    Di Pietro, R., Mancini, L.V., Mei, A., Panconesi, A.: A Panconesi: Connectivity Properties of Secure Wireless Sensor Networks. In: Proc. of the 2nd ACM SASN workshop, pp. 53–58 (2004)Google Scholar
  10. 10.
    Basagni, S., Herrin, K., Rosti, E., Bruschi, D.: Secure pebblenets. In: Proc. of the 2nd ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 156–163 (2001)Google Scholar
  11. 11.
    Baldus, H., Klabunde, K., Müsch, G.: Reliable set-up of medical body-sensor networks. In: Karl, H., Wolisz, A., Willig, A. (eds.) EWSN 2004. LNCS, vol. 2920, pp. 353–363. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  12. 12.
    Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L., Rubenstein, D.: Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with Zebranet. In: Proc. of the Tenth International Conference on Architectural Support for Programming Languages and Operating Systems (2002)Google Scholar
  13. 13.
    Çamtepe, S.A., Yener, B.: Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 293–308. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  14. 14.
    Lee, J., Stinson, D.R.: Deterministic Key Predistribution Schemes for Distributed Sensor Networks. In: Proc. 11th International Workshop, pp. 294–307 (2004)Google Scholar
  15. 15.
    Sánchez, D., Baldus, H.: A Deterministic Pairwise Key Pre-distribution Scheme for Mobile Sensor Networks. In: Proc. of the First International Conference on Security and Privacy for Emerging Areas in Communication Networks, pp. 277–288 (2005)Google Scholar
  16. 16.
    Chan, H., Perrig, A., Song, D.: Key distribution techniques for sensor networks, pp. 277–303. Kluwer Academic Publishers, Dordrecht (2004)Google Scholar
  17. 17.
    Perrig, A., Szewczyk, R., Wen, V., Cullar, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. In: Proc. of MOBICOM (2001)Google Scholar
  18. 18.
    Romer, K., Mattern, F.: The design space of wireless sensor networks. IEEE Wireless Communications 11(6), 54–61 (2004)CrossRefGoogle Scholar
  19. 19.
    Newsome, J., Shi, E., Song, D., Perrig, A.: The sybil attack in sensor networks: analysis & defenses. In: Proc. of the Third International Symposium on Information Processing in Sensor Networks, pp. 259–268 (2004)Google Scholar
  20. 20.
    Zhang, Y., Lee, W.: Intrusion Detection in Wireless Ad-Hoc Networks. In: Proc. of the 6th International Conference on Mobile Computing and Networking, pp. 275–283 (2000)Google Scholar
  21. 21.
    Brutch, P., Ko, C.: Challenges in intrusion detection for wireless ad-hoc networks. In: Proc. of the Symposium on Applications and the Internet Workshops, pp. 368–373 (2003)Google Scholar
  22. 22.
    Ganeriwal, S., Srivastava, M.B.: Reputation-based Framework for High Integrity Sensor Networks. In: Proc. of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 66–77 (2004)Google Scholar
  23. 23.
    Watkins, D., Scott, C.: Methodology for evaluating the effectiveness of intrusion detection in tactical mobile ad-hoc networks. In: Proc. of the IEEE Wireless Communications and Networking Conference, vol. 1, pp. 622–627 (2004)Google Scholar
  24. 24.
    Nadkarni, K., Mishra, A.: A novel intrusion detection approach for wireless ad hoc networks. In: Proc. of the IEEE Wireless Communications and Networking Conference, vol. 2, pp. 831–836 (2004)Google Scholar
  25. 25.
    Spencer, J.: The Strange Logic of Random Graphs. Algorithms and combinatorics, vol. 22. Springer, Heidelberg (2000)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • David Sánchez Sánchez
    • 1
  • Heribert Baldus
    • 1
  1. 1.Connectivity Systems GroupPhilips ResearchAachenGermany

Personalised recommendations