A Key Management Scheme with Encoding and Improved Security for Wireless Sensor Networks
Wireless sensor networks are emerging as a promising solution for various types of futuristic applications both for military and public. Security in wireless sensor networks is very crucial as these networks are expected mainly to operate in the hazardous and hostile environments. Efficient key management could guarantee authenticity and confidentiality of the data exchanged among the nodes in the network. In this paper, we propose an improved and efficient key pre-distribution scheme for wireless sensor networks. Our scheme significantly increases the storage efficiency and security than that of the previously proposed scheme based on LU decomposition. It also ensures node-to-node mutual authentication in a way that an eavesdropper cannot harm the network by monitoring the traffic flows in the network. We also present detailed performance analysis and compare our scheme with the existing schemes.
KeywordsSensor Node Wireless Sensor Network Intrusion Detection System Improve Security
Unable to display preview. Download preview PDF.
- 1.Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s Ad Hoc Network Journal, Special Issue on Sensor Network Applications and Protocols, 293–315 (September 2003)Google Scholar
- 2.Pathan, A.-S.K., Lee, H.-W., Hong, C.S.: Security in Wireless Sensor Networks: Issues and Challenges. In: Proceedings of the 8th IEEE ICACT 2006, Phoenix Park, Korea, February 20-22, 2006, vol. II, pp. 1043–1048 (2006)Google Scholar
- 4.Jolly, G., Kuscu, M.C., Kokate, P., Younis, M.: A Low-Energy Key Management Protocol for Wireless Sensor Networks. In: Proc. Eighth IEEE ISCC 2003, vol. 1, pp. 335–340 (2003)Google Scholar
- 5.Rabaey, J.M., Ammer, J., Karalar, T., Li, S., Otis, B., Sheets, M., Tuan, T.: PicoRadios for wireless sensor networks: the next challenge in ultra-low power design. In: IEEE ISSCC 2002, February 3-7, 2002, vol. 1, pp. 200–201 (2002)Google Scholar
- 6.Hollar, S.: COTS Dust. Master’s Thesis, Electrical Engineering and Computer Science Department, UC Berkeley (2000)Google Scholar
- 7.Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proc. 2003 IEEE Symposium on Security and Privacy, May 11-14, 2003, pp. 197–213 (2003)Google Scholar
- 9.Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and Communications, Washington, DC, USA, November 18-22, 2002, pp. 41–47 (2002)Google Scholar
- 12.Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A key management scheme for wireless sensor networks using deployment knowledge. In: Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies. INFOCOM 2004, March 7-11, 2004, vol. 1, pp. 586–597 (2004)Google Scholar
- 14.Blundo, C., Santis, A.D., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)Google Scholar
- 16.Nakos, G., Joyner, D.: Linear Algebra with Applications, pp. 188–194. Brooks/Cole, USA (1998)Google Scholar
- 17.Birkhauser, Linear Algebra, Birkhauser Boston, pp. 33–37 (1997)Google Scholar
- 18.Douceur, J.: The Sybil Attack. In: 1st International Workshop on Peer-to-Peer Systems (2002)Google Scholar