A Novel Key Update Protocol in Mobile Sensor Networks
Wireless Sensor Networks (WSN) have found applications in many areas including healthcare, military and behavior monitoring. However, due to various factors (e.g. use of a wireless channel, deployment in public and unattended areas), WSN applications are vulnerable to various attacks such as impersonation, replay, selective forwarding and sink hole. Therefore, security is an important issue to protect data in WSN. Several symmetric key based security schemes have been proposed in WSN for node authentication and secure data delivery. Most of the schemes are applicable for static WSN, where nodes once deployed, are not allowed to change their locations. However, depending on the application requirements, nodes in WSN may require to move from one place to another. The problem of authenticated pair-wise key update in dynamic WSN has not been addressed adequately in literature. In this paper, we propose a key update protocol which securely updates the session key between a pair of nodes with the help of random inputs in mobile sensor networks. Initially, a unique master key is obtained using symmetric bi-variate polynomial shares. This key is further used in authenticating and establishing the pair-wise key between a pair of nodes. Random inputs from both the participating nodes are used to update the pair-wise key in the mobile WSN setup. The security analysis shows that the proposed protocol resists known-key, impersonation, replay, worm and sink hole attacks. The proposed protocol also provides forward secrecy, key freshness, and mutual key control.
KeywordsWireless sensor networks Mobility Authentication Key establishment Node capture Key control
Unable to display preview. Download preview PDF.
- 2.Padmavathi, G., Shanmugapriya, D.: A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks. International Journal of Computer Science and Information Security 4(1&2), 117–125 (2009)Google Scholar
- 4.Roman, R., Lopez, J., Alcaraz, C., Chen, H.-H.: SenseKey: Simplifying the Selection of Key Management Schemes for Sensor Networks. In: Proceedings of 5th International Symposium on Security and Multimodality in Pervasive Environments, SMPE, pp. 789–794 (2011)Google Scholar
- 6.Liu, D., Ning, P.: Establishing pair wise keys in distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 52–61 (2003)Google Scholar
- 7.Eschenauer, L., Gligor, V.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47 (2002)Google Scholar
- 10.Liao, Y., Lei, C., Wang, A.: A Robust Grid-Based Key Predistribution Scheme for Sensor Networks. In: Proceedings of the Fourth International Conference on Innovative Computing, Information and Control, pp. 760–763 (2009)Google Scholar
- 11.Song, G., Leung, V., Zhuzhong, Q.: A Permutation-Based Multi-Polynomial Scheme for Pairwise Key Establishment in Sensor Networks. In: Proceedings of IEEE International Conference on Communications, ICC, pp. 1–5 (2010)Google Scholar
- 14.Lin, X.: CAT: building couples to early detect node compromise attack in wireless sensor networks. In: Proceedings of the 28th IEEE Conference on Global Telecommunications, pp. 2755–2760 (2009)Google Scholar