Pairwise Key Setup and Authentication Utilizing Deployment Information for Secure Sensor Network

  • Inshil Doh
  • Jung-Min Park
  • Kijoon Chae
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4208)


For secure sensor network communications, pairwise key establishment between sensor nodes and data authentication are essential. In this paper, we propose cluster based key establishment mechanism in which clusterheads distribute key materials at the requests of their own members and an authentication mechanism using the pairwise keys established. Our proposal increases the degree of network connectivity and resilience against node capture by utilizing clusterheads which carry more key-related information. It also increases the authenticity of sensed data and further decreases unnecessary traffic by filtering false data.


Sensor Network Sensor Node Node Capture Node Capture Attack Neighbor Sensor Node 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Carman, D.W., Kruus, P.S., Matt, B.J.: Constraints and approaches for distributed sensor network security, Technical report, NAI Labs (2000)Google Scholar
  2. 2.
    Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  3. 3.
    Eschenauer, L., Gligor, V.D.: A key management scheme for distributed sensor networks. In: Proc. of the 9th ACM CCS 2002, pp. 41–47 (2002)Google Scholar
  4. 4.
    Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Research in Security and Privacy, pp. 197–213 (2003)Google Scholar
  5. 5.
    Du, W., Deng, J., Han, Y.S., Varshney, P.: A pairwise key predistribution scheme for wireless sensor networks. In: Proc. of 10th ACM CCS 2003 (2003)Google Scholar
  6. 6.
    Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proc. of 10th ACM CCS 2003, pp. 52–61 (2003)Google Scholar
  7. 7.
    Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)Google Scholar
  8. 8.
    Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.: A key management scheme for wireless sensor networks using deployment knowledge. In: Proc. of IEEE INFOCOM (2004)Google Scholar
  9. 9.
    Yu, Z., Guan, Y.: A Robust Group-based Key Management Scheme for Wireless Sensor Networks. IEEE Communications Society, WCNC (2005)Google Scholar
  10. 10.
    Zhu, S., Setia, S., Jajodia, S., Ning, P.: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. In: Proc. of IEEE Symposium on Security and Privacy (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Inshil Doh
    • 1
  • Jung-Min Park
    • 1
  • Kijoon Chae
    • 1
  1. 1.Dept. of Computer Science and EngineeringEwha Womans UniversityKorea

Personalised recommendations