Skip to main content

Achieving Fast Self Healing in Wireless Sensor Networks Using Multi-generation Deployment Schemes

  • Conference paper
e-Business and Telecommunications (ICETE 2008)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 48))

Included in the following conference series:

  • 798 Accesses

Abstract

The majority of studies on security in resource limited wireless sensor networks (WSN) focus on finding an efficient balance among energy consumption, computational speed and memory usage. Besides these resources, time is a relatively immature aspect that can be considered in system design and performance evaluations. In a recent study by Castelluccia and Spognardi , the time dimension is used to lower the ratio of compromised links, thus, improving resiliency in key distribution in WSNs. This is achieved by making the old and possibly compromised keys useful only for a limited amount of time. In this way, the effect of compromised keys diminish in time, so the WSN selfheals. In this study we further manipulate the time dimension and propose a deployment model that speeds up the resilience improvement process with a tradeoff between connectivity and resiliency. In our method, self healing speeds up by introducing nodes that belong to future generations in the time scale. In this way, the duration that the adversary can make use of compromised keys become smaller.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks 38(4), 393–422 (2002)

    Article  Google Scholar 

  2. Anjum, F.: Location dependent key management using random key-predistribution in sensor networks. In: WiSe 2006: Proceedings of the 5th ACM workshop on Wireless security, pp. 21–30. ACM Press, New York (2006)

    Chapter  Google Scholar 

  3. Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  4. Camtepe, S., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks (2004)

    Google Scholar 

  5. Castelluccia, C., Spognardi, A.: Rok: A robust key pre-distribution protocol for multi-phase wireless sens or networks. In: SecureComm 2007, Third International Conference on Security and Privacy in Communication Networks (2007)

    Google Scholar 

  6. Chan, H., Perrig, A.: Pike: peer intermediaries for key establishment in sensor networks. In: Proceedings IEEE, INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. (2005)

    Google Scholar 

  7. Dong, Q., Liu, D.: Using auxiliary sensors for pairwise key establishment in WSN. In: Akyildiz, I.F., Sivakumar, R., Ekici, E., Oliveira, J.C.d., McNair, J. (eds.) NETWORKING 2007. LNCS, vol. 4479, pp. 251–262. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  8. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: CCS 2003: Proceedings of the 10th ACM conference on Computer and communications security, pp. 42–51. ACM, New York (2003)

    Chapter  Google Scholar 

  9. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: CCS 2002: Proceedings of the 9th ACM conference on Computer and communications security, pp. 41–47. ACM, New York (2002)

    Chapter  Google Scholar 

  10. Lu, K., Qian, Y., Hu, J.: A framework for distributed key management schemes in heterogeneous wireless sensor networks. In: IPCCC 2006, 25th IEEE International Performance, Computing, and Communications Conference (2006)

    Google Scholar 

  11. Mehta, M., Huang, D., Harn, L.: Rink-rkp: a scheme for key predistribution and shared-key discovery in sensor networks. In: IPCCC 2005, Proc. 24th IEEE Int’l. Performance, Computing, and Comm. Conf. (2005)

    Google Scholar 

  12. Yang, C., Zhou, J., Zhang, W., Wong, J.: Pairwise Key Establisment for Large-scale Sensor Networks: from Identifier-based to Location-based. In: ACM International Conference Proceeding Series Proceedings of the 1st international conference on Scalable information systems (2006)

    Google Scholar 

  13. Yu, Z., Guan, Y.: A key pre-distribution scheme using deployment knowledge for wireless sensor networks. In: IPSN 2005: Proceedings of the 4th international symposium on Information processing in sensor networks, Piscataway, NJ, USA, p. 35. IEEE Press, Los Alamitos (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yılmaz, Ö.Z., Levi, A., Savaş, E. (2009). Achieving Fast Self Healing in Wireless Sensor Networks Using Multi-generation Deployment Schemes. In: Filipe, J., Obaidat, M.S. (eds) e-Business and Telecommunications. ICETE 2008. Communications in Computer and Information Science, vol 48. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-05197-5_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-05197-5_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-05196-8

  • Online ISBN: 978-3-642-05197-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics