Advertisement

A Novel Key Update Protocol in Mobile Sensor Networks

  • Sarita Agrawal
  • Rodrigo Roman
  • Manik Lal Das
  • Anish Mathuria
  • Javier Lopez
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7671)

Abstract

Wireless Sensor Networks (WSN) have found applications in many areas including healthcare, military and behavior monitoring. However, due to various factors (e.g. use of a wireless channel, deployment in public and unattended areas), WSN applications are vulnerable to various attacks such as impersonation, replay, selective forwarding and sink hole. Therefore, security is an important issue to protect data in WSN. Several symmetric key based security schemes have been proposed in WSN for node authentication and secure data delivery. Most of the schemes are applicable for static WSN, where nodes once deployed, are not allowed to change their locations. However, depending on the application requirements, nodes in WSN may require to move from one place to another. The problem of authenticated pair-wise key update in dynamic WSN has not been addressed adequately in literature. In this paper, we propose a key update protocol which securely updates the session key between a pair of nodes with the help of random inputs in mobile sensor networks. Initially, a unique master key is obtained using symmetric bi-variate polynomial shares. This key is further used in authenticating and establishing the pair-wise key between a pair of nodes. Random inputs from both the participating nodes are used to update the pair-wise key in the mobile WSN setup. The security analysis shows that the proposed protocol resists known-key, impersonation, replay, worm and sink hole attacks. The proposed protocol also provides forward secrecy, key freshness, and mutual key control.

Keywords

Wireless sensor networks Mobility Authentication Key establishment Node capture Key control 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Shi, E., Perrig, A.: Designing Secure Sensor Networks. IEEE Wireless Communications 11(6), 38–43 (2004)CrossRefGoogle Scholar
  2. 2.
    Padmavathi, G., Shanmugapriya, D.: A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks. International Journal of Computer Science and Information Security 4(1&2), 117–125 (2009)Google Scholar
  3. 3.
    Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks Journal 38(4), 393–422 (2002)CrossRefGoogle Scholar
  4. 4.
    Roman, R., Lopez, J., Alcaraz, C., Chen, H.-H.: SenseKey: Simplifying the Selection of Key Management Schemes for Sensor Networks. In: Proceedings of 5th International Symposium on Security and Multimodality in Pervasive Environments, SMPE, pp. 789–794 (2011)Google Scholar
  5. 5.
    Ren, Y., Oleshchuk, V., Li, F., Ge, X.: Security in Mobile Wireless Sensor Networks - A Survey. Journal of Communications 6(2), 128–142 (2011)CrossRefGoogle Scholar
  6. 6.
    Liu, D., Ning, P.: Establishing pair wise keys in distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 52–61 (2003)Google Scholar
  7. 7.
    Eschenauer, L., Gligor, V.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47 (2002)Google Scholar
  8. 8.
    Kim, J., Han, Y., Park, S., Chung, T.: N-Dimensional Grid-Based Key Predistribution in Wireless Sensor Networks. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part II. LNCS, vol. 4706, pp. 1107–1120. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  9. 9.
    Delgosha, F., Fekri, F.: A Multivariate Key-Establishment Scheme for Wireless Sensor Networks. IEEE Transactions on Wireless Communications 8(4), 1814–1824 (2009)CrossRefGoogle Scholar
  10. 10.
    Liao, Y., Lei, C., Wang, A.: A Robust Grid-Based Key Predistribution Scheme for Sensor Networks. In: Proceedings of the Fourth International Conference on Innovative Computing, Information and Control, pp. 760–763 (2009)Google Scholar
  11. 11.
    Song, G., Leung, V., Zhuzhong, Q.: A Permutation-Based Multi-Polynomial Scheme for Pairwise Key Establishment in Sensor Networks. In: Proceedings of IEEE International Conference on Communications, ICC, pp. 1–5 (2010)Google Scholar
  12. 12.
    Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory IT-22, 644–654 (1976)MathSciNetCrossRefGoogle Scholar
  13. 13.
    Shim, K.: The Risks of Compromising Secret Information. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol. 2513, pp. 122–133. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  14. 14.
    Lin, X.: CAT: building couples to early detect node compromise attack in wireless sensor networks. In: Proceedings of the 28th IEEE Conference on Global Telecommunications, pp. 2755–2760 (2009)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Sarita Agrawal
    • 1
  • Rodrigo Roman
    • 2
  • Manik Lal Das
    • 1
  • Anish Mathuria
    • 1
  • Javier Lopez
    • 3
  1. 1.Dhirubhai Ambani Institute of Information and Communication TechnologyGandhinagarIndia
  2. 2.Institute for Infocomm ResearchSingapore
  3. 3.University of MalagaSpain

Personalised recommendations