A Secure Key Agreement Scheme in Low-Energy Wireless Sensor Networks
Ubiquitous computing environment provides users with information access anytime and anywhere. In particular, sensor networks must be broadly deployed in real world and utilized to ensure the safety of the human life. In cryptography aspect, key agreement protocol is very important element to exchange messages safely between sensor nodes. This concern originates from the fact that sensor nodes are highly vulnerable to faults, energy depletions, and security attacks. The open problems are how to verify the identity of communicating nodes, how to set up a session key between communicating nodes, and how to minimize any information about the keys disclosed to the other side of key agreement. To solve above problems, we propose a secure key agreement scheme for low-energy sensor networks. Our scheme is based on the MRS scheme and enhances the security by hiding unshared keys and the number of shared keys. Besides, it resolves the weak points in encryption mechanism of MRS by employing multiple random numbers. Performance and security analyses have proven that our scheme is suitable for sensor networks in terms of availability and security aspects.
KeywordsSensor Node Wireless Sensor Network Malicious Node Legitimate Node Encrypt Coefficient
Unable to display preview. Download preview PDF.
- 1.Cam, H., Ozdemir, S., Muthuavinashiappan, D., Nair, P.: Energy-Efficient Security Protocol for Wireless Sensor Networks. In: Proc. of IEEE VTC Fall 2003 Conference, Orlando, October 4-9, pp. 2981–2984 (2003)Google Scholar
- 2.Eschenauer, L., Gligor, V.D.: A Key-management Scheme for DistributedSensor Networks. In: Proc. of the 9th ACM Conference on Computer and Communications Security, pp. 41–47 (2002)Google Scholar
- 3.Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In: Proc. of ACM Conference on Computer and Communications Security (CCS 2003), pp. 42–51 (2003)Google Scholar
- 4.Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: IEEE Symposium on Research in Security and Privacy, May 11-14, 2003, pp. 197–213 (2003)Google Scholar
- 5.Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In: IEEE INFOCOM, pp. 586–597 (2004)Google Scholar
- 6.Liu, D., Ning, P., Du, W.: Group-Based Key Pre-distribution in Wireless Sensor Networks. In: Proc. of 10th ACM Conference on Computer and Communications Security (CCS 2003), pp. 11–20 (2003)Google Scholar
- 7.Chan, A.C.-F.: Distributed Symmetric Key Management for Mobile Ad hoc Networks. IEEE INFOCOM, 2414–2424 (2004)Google Scholar
- 8.Rivest, R.L., Adleman, L., Dertouzos, M.L.: On Data Banks and Privacy. In: DeMillo, R.A., et al. (eds.) Foundations of Secure Computation, pp. 169–179. Academic Press, London (1978)Google Scholar