An Efficient ID-Based Bilinear Key Predistribution Scheme for Distributed Sensor Networks

  • Tran Thanh Dai
  • Cao Trong Hieu
  • Choong Seon Hong
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4208)


Security requirements are very pressing in distributed sensor networks due to exploitation purposes of these networks in human life, especially in military tasks. To obtain security in these sorts of networks, it is crucial to enable message encryption and authentication features among sensor nodes. This thing could be performed using keys agreed upon by communicating nodes. Nonetheless, acquiring such key agreement in distributed sensor networks becomes extremely intricate due to resource constraints. Up to now, there are many key agreement schemes proposed wired and wireless networks of which key predistribution schemes are considered to be the fittest solutions. Based on this observation, in this paper, we propose a key predistribution scheme relying on sensor nodes’ unique identifiers. Our scheme exhibits several noteworthy properties: direct pairwise key establishment permission with explicit key authentication, high resiliency against information-theoretic security attack (node capture attack). We also present a detailed security and performance analysis of our scheme in terms of node capture attack, memory usage, communication overhead, and computational overhead.


Sensor Network Sensor Node Wireless Sensor Network Message Authentication Code Elliptic Curve Cryptography 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Matsumoto, T., Imai, H.: On the Key Predistribution System: A Practical Solution to the Key Distribution Problem. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 185–193. Springer, Heidelberg (1988)Google Scholar
  2. 2.
    Stallings, W.: Cryptography and Network Security: Principles and Practice. Prentice-Hall, Englewood Cliffs (1998)Google Scholar
  3. 3.
    Rhee, M.Y.: Internet Security: Cryptographic Principles, Algorithms, and Protocols. Wiley, Chichester (2003)Google Scholar
  4. 4.
    Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: CCS 2003, Washington, DC, USA (October 2003)Google Scholar
  5. 5.
    Wood, A.D., Stankovic, J.A.: Denial of Service in Sensor Networks. IEEE Computer 35(10), 54–62 (2002)Google Scholar
  6. 6.
    Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. In: Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113–127 (May 2003)Google Scholar
  7. 7.
    Potlapally, N.R., Ravi, S., Raghunathan, A., Jha, N.K.: A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols. IEEE Transactions on Mobile Computing 5(2) (February 2006)Google Scholar
  8. 8.
    Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings 2003 IEEE Symposium on Security and Privacy, pp. 197–213 (May 2003)Google Scholar
  9. 9.
    Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A Pairwise Key Predistribution Scheme for Wireless Sensor Networks. ACM Transactions on Information and System Security 8(2), 228–258 (2005)CrossRefGoogle Scholar
  10. 10.
    Liu, D., Ning, P., Li, R.: Establishing Pairwise Keys in Distributed Sensor Networks. ACM Transactions on Information and System Security 8(1), 41–77 (2005)CrossRefGoogle Scholar
  11. 11.
    Blaß, E.-O., Zitterbart, M.: Towards Acceptable Public-Key Encryption in Sensor Networks. In: Proceedings of the 2nd International Workshop on Ubiquitous Computing, ACM SIGMIS (May 2005)Google Scholar
  12. 12.
    Wander, A.S., Gura, N., Eberle, H., Gupta, V., Shantz, S.C.: Energy analysis of public-key cryptography for wireless sensor networks. In: Proceedings of the 3rd IEEE International Conference on Pervasive Computing and Communications, pp. 324–328 (March 2005)Google Scholar
  13. 13.
    Blundo, C., Santis, A.D., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)Google Scholar
  14. 14.
    Hanaoka, G., Nishioka, T., Zheng, Y., Imai, H.: A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks. The Computer Journal 45(3) (2002)Google Scholar
  15. 15.
    Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, D.: SPINS: Security protocols for sensor networks. In: Proceedings of 7th Annual International Conference on Mobile Computing and Networks (July 2001)Google Scholar
  16. 16.
    Liu, D., Ning, P.: Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In: Proceedings of the 10th Annual Network and Distributed System Security Symposium, pp. 263–276 (February 2003)Google Scholar
  17. 17.
    Karlof, C., Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. In: Proceedings of the 2nd international conference on Embedded networked sensor systems (November 2004)Google Scholar
  18. 18.
    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47 (November 2002)Google Scholar
  19. 19.
    Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: INFOCOM 2004, Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 1 (March 2004)Google Scholar
  20. 20.
    Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  21. 21.
    Du, W., Ding, J., Han, Y., Varshney, P.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In: Proceedings of the ACM Conference on Computer and Communication Security (CCS 2003), Washington, D.C. (October 2003)Google Scholar
  22. 22.
    Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In: Proceedings of 10th ACM Conference on Computer and Communications Security (CCS 2003), pp. 62–72 (October 2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Tran Thanh Dai
    • 1
  • Cao Trong Hieu
    • 1
  • Choong Seon Hong
    • 1
  1. 1.Networking Lab, Department of Computer EngineeringKyung Hee University, GiheungYongin, GyeonggiKorea

Personalised recommendations