Advertisement

Key Establishment in Heterogeneous Self-organized Networks

  • Gelareh Taban
  • Rei Safavi-Naini
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4572)

Abstract

Traditional key pre-distribution schemes in sensor and ad hoc networks rely on the existence of a trusted third party to generate and distribute a key pool. The assumption of a single TTP however can be very strong in practice, especially when nodes belong to different domains and they come together in an ad hoc manner. In this work, we show the shortcomings of previous approaches [3,13] in terms of both efficiency and security. By incorporating a heterogeneous network, we show that we can dramatically reduce the load on resource constrained devices whilst also increasing their security. We also propose a new strengthened security model for self-organized ad hoc networks and evaluate the security of our protocol in this model.

Keywords

group key key pre-distribution self-organized networks 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
  2. 2.
    Mica motes. http://www.xbow.com
  3. 3.
    Chan, A.: Distributed symmetric key management for mobile ad hoc networks. In: Proc. of Annual Joint Conference of IEEE Computer and Communication Societies, INFOCOM, March 2004, vol. 4, pp. 2414–2424 (2004)Google Scholar
  4. 4.
    Chan, H., Perrig, A.: Security and privacy in sensor networks. In: IEEE Computer, October 2003, vol. 36, pp. 103–105 (2003)Google Scholar
  5. 5.
    Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proc. of Symposium on Security and Privacy, May 2003, pp. 11–14 (2003)Google Scholar
  6. 6.
    Du, W., Deng, J., Han, Y., Varshney, P., Katz, J., Khalili, A.: A pariwise key predistribution scheme for wireless sensor networks. ACM Transactions on Information and Systems Security 8(2), 228–258 (2005)CrossRefGoogle Scholar
  7. 7.
    Du, X., Lin, F.: Improving routing in sensor networks with heterogeneous sensor nodes. IEEE Vehicular Technology Conference, pp. 2528–2532 (2005)Google Scholar
  8. 8.
    Eschenauer, L., Gligor, V.: A key management scheme for distributed sensor networks. In: Proc. of 9th ACM Conference on Computer and Communications Security, Washington, DC, pp. 41–47 (2002)Google Scholar
  9. 9.
    Gamal, T.E.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information Theory 31(4), 469–472 (1985)zbMATHCrossRefGoogle Scholar
  10. 10.
    Lee, J., Stinson, D.R.: A combinatorial approach to key predistribution for distributed sensor networks. In: Proc. of IEEE Wireless Communications and Networking Conference, March 2005, vol. 2, pp. 1200–1205 (2005)Google Scholar
  11. 11.
    Liu, D., Ning, P.: Location-based pairwise key establishments for static sensor networks. In: Proc. of 1st ACM Workshop on Security of Ad hoc and Sensor Networks, Fairfax, Virginia, pp. 72–82 (2003)Google Scholar
  12. 12.
    Lorincz, K., Malan, D.J., Fulford-Jones, T.R.F., Nawoj, A., Clavel, A., Shnayder, V., Mainland, G., Welsh, M., Moulton, S.: Sensor networks for emergency response: Challenges and opportunities. IEEE Pervasive Computing, pp. 16–23 (October 2004)Google Scholar
  13. 13.
    Luo, L., Safavi-Naini, R., Baek, J., Susilo, W.: Self-organized group key management for ad-hoc networks. In: Proc. of ACM Symposium on Information, Computer and Communications Security (AsiaCCS) (2006)Google Scholar
  14. 14.
    Taban, G., Safavi-Naini, R.: Key establishment in heterogeneous self-organized networks. ISR Tech. Report TR2007-6, University Of Maryland, College Park (2007)Google Scholar
  15. 15.
    Traynor, P., Choi, H., Cao, G., Zhu, S., La Porta, T.: Establishing pair-wise keys in heterogeneous sensor networks. In: Proc. of Annual Joint Conference of IEEE Computer and Communication Societies, INFOCOM, vol. 4, pp. 2414–2424 (2006)Google Scholar
  16. 16.
    Wu, J., Wei, R.: Comments on Distributed Symmetric Key Management for Mobile Ad hoc Networks from INFOCOM 2004. Cryptology ePrint Archive, Report 2005/008 (2005), http://eprint.iacr.org/

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Gelareh Taban
    • 1
  • Rei Safavi-Naini
    • 2
  1. 1.University of Maryland, College Park 
  2. 2.University of Calgary 

Personalised recommendations