Skip to main content

Key Pre-distribution Techniques for WSN Security Services

  • Chapter
  • First Online:
Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations

Part of the book series: Intelligent Systems Reference Library ((ISRL,volume 70))

Abstract

In recent years, thanks to technology advances in low-power wirelessly networked systems and, we have witnessed the emergence of Wireless Sensor Networks (WSNs) and embedded computing technologies in many fields of our life; which range from military to medical applications and from industry to home appliances. Although most of researchers focus on designing protocols that maximizes both the processing capabilities and energy reserves, many of these protocols pay little attention to securing this WSNs. Nowadays, security goal is vital for ensuring the performance and the acceptance of the wireless sensor networks in many recent applications. This goal is still a challenge on account of the constraint resources of these wireless sensor nodes. This chapter givesan overviewof the desired security services required for the WSNs, their threats model and finally the chapter presents in details different pairwise key distribution security techniques for distribution WSNs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. http://www.itu.int (2014). Accessed 16 Jan 2014

  2. I.-T.R. X.800: Security Architecture for Open Systems Interconnection for CCITT Applications, Geneva (1991)

    Google Scholar 

  3. Ozgur, A., Lévêque, O., Tse, D.: Spatial degrees of freedom of large distributed MIMO systems and wireless ad hoc networks. IEEE J. Sel. Areas Commun. 31(2), 202–214 (2013)

    Google Scholar 

  4. Yassine, M., Ezzati, A.: A review of security attacks and intrusion detection schemes in wireless sensor network. Int. J. Wireless Mob. Netw. 5(6), 79 (2013)

    Google Scholar 

  5. Aashima, S., Sachdeva, R.: Review on security issues and attacks in wireless sensor networks. Int. J. 10(1), 1–24 (2013)

    Google Scholar 

  6. Singh, S.K., Singh, M.P., Singh, D.K: A survey on network security and attack defense mechanism for wireless sensor networks. Int. J. Comput. Trends Technol. 1(1) (2011) (ISSN: 2231–2803)

    Google Scholar 

  7. Gopalakrishnan, S.: A survey of wireless network security. Int. J. Comput. Sci. Mobile Comput. 3(1), 53–68 (2014)

    Google Scholar 

  8. Fouad, M.M.M., El-Bendary, N., Ramadan, R.A., Hassanien, A.E.: Wireless sensor networks: a medical perspective. In: Wireless Sensor Networks: From Theory to Applications Book, CRC Press, USA (ISBN 9781466518100)

    Google Scholar 

  9. Manisha, P., Singh, Y.: Security issues and sybil attack in wireless sensor networks. Int. J. P2P Netw. Trends Technol. 3(1), 7–13 (2013)

    Google Scholar 

  10. El-Bendary, N., Fouad, M.M.M., Ramadan, R.A., Banerjee, S., Hassanien, A.E.: Smart environmental monitoring using wireless sensor networks. In: Wireless Sensor Networks: From Theory to Applications Book, CRC Press, USA (2013) (ISBN 9781466518100)

    Google Scholar 

  11. Yongji, R.: BRS-based robust secure localization algorithm for wireless sensor networks. Int. J. Distrib. Sens. Netw. 2013, 46–55 (2013)

    Google Scholar 

  12. Karlof, C., Wagner, D.: Secure routing in sensor networks: attacks and countermeasures. Elsevier’s Ad Hoc Netw. J. Spec. Issue Sens. Netw. 1(2–3), 293–315 (2003)

    Google Scholar 

  13. Mohammadi, S., Hossein, J.: A Comparison of Link Layer Attacks on Wireless Sensor Networks. arXiv preprint arxiv.org/abs/1103.5589, (2011)

  14. Zomaya, A.Y.: Algorithms and Protocols for Wireless Sensor Networks. Wiley, New York (2009) (ISBN 978-0-471-79813-2)

    Google Scholar 

  15. Sen, J.: A survey on wireless sensor network security. Int. J. Commun. Netw. Inf. Secur. 1(2), 55–78 (2009)

    Google Scholar 

  16. Gabrielli, A., Mancini, L.V., Setia, S., Jajodia, S.: Securing topology maintenance protocols for sensor networks. In: 1st Conference on IEEE Security and Privacy for Emerging Areas in Communications Networks (SecureComm), pp. 101–112. ACM Press, New York (Sept 2005)

    Google Scholar 

  17. Gabrielli, A., Conti, M., Di Pietro, R., Mancini, L.: Sec-TMP: a secure topology maintenance protocol for event delivery enforcement in WSN. In: Proceedings of 5th Conference on Security and Privacy in Communication Networks (SecureComm 2009), pp. 265–284. Athens, Greece (Sept 2009)

    Google Scholar 

  18. Stajano, F.: Security for Ubiquitous Computing. Wiley, New York (2002)

    Google Scholar 

  19. Matthew, P., Sencun, Z., Vijaykrishnan, N., McDaniel, P., Kandemir, M., Brooks, R.: The sleep deprivation attack in sensor networks: analysis and methods of defense. Int. J. Distrib. Sens. Netw. 2(3), 267–287 (2006)

    Google Scholar 

  20. Meenakshi, T., Gaur, M.S., Laxmi, V., Sharma, P.: Detection and countermeasure of node misbehaviour in clustered wireless sensor network. In: Proceedings of the ISRN Sensor Networks (2013)

    Google Scholar 

  21. Xu, Y., Heidemann, J., Estrin, D.: Geography-informed energy conservation for Ad-hoc routing. In: Proceedings of the 7th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 70–84. Atlanta (2001)

    Google Scholar 

  22. Chen, B., Jamieson, K., Balakrishnan, H., Morris, R.: Span: an energy-efficient coordination algorithm for topology maintenance in ad hoc wireless networks. Wireless Netw. 8(5), 481–494 (2002)

    Article  MATH  Google Scholar 

  23. Xu, Y., Heidemann, J., Estrin, D.: Energy conservation by adaptive clustering for ad-hoc networks. In: Poster Session of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’02). Lausanne, Switzerland (June 2002)

    Google Scholar 

  24. Fouad, M.M.M., Dawood, A.R., Mostafa, M.-S.M.: Study of the effects of pairwise key pre-distribution scheme on the performance of a topology control protocol. In: Proceedings of the 2nd International Workshop on Mobility in Wireless Sensor Networks (MobiSensor’2011) that held in conjunction with the 7th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS ’2011), Barcelona, Spain, (June 2011)

    Google Scholar 

  25. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of IEEE Symposium on Security and Privacy, IEEE Computer Society, pp. 197–213. Washington, DC, (2003)

    Google Scholar 

  26. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22, 644–654 (1976)

    Google Scholar 

  27. Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MATH  MathSciNet  Google Scholar 

  28. Perrig, A., Szewczyk, R., Wen, V., Cullar, D., Tygar, J.D.: Spins: security protocols for sensor networks. In: Proceedings of the 7th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom), pp. 189–199. Rome, Italy, (July 2001)

    Google Scholar 

  29. Camtepe, S.A., Yener, B.: Key distribution mechanisms for wireless sensor networks: a survey. Rensselaer Polytechnic Institute, pp. 05–07. Troy, New York, Technical Report (2005)

    Google Scholar 

  30. Liu, D., Ning, P., Li, R.: Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur. 8(1), 41–77 (2005)

    Google Scholar 

  31. Fouad, M.M.M., Mostafa, M.-S.M., Dawood, A.R.: SOPK: Second opportunity pairwise key scheme for topology control protocols. In: Proceedings of IEEE 3rd International Conference on Intelligent Systems, Modelling and Simulation (ISMS), pp. 632–638. (2012)

    Google Scholar 

  32. Anderson, R., Kuhn, M.: Tamper resistance—a cautionary note. In: Proceedings of the Second Usenix Workshop on Electronic Commerce, pp. 1–11. (November 1996)

    Google Scholar 

  33. Kalpana, S., Ghose, M.K., Kumar, D., Singh, R.P.K., Pandey, V.K.: A comparative study of various security approaches used in wireless sensor networks. Int. J. Adv. Sci. Technol. 17, 31–44 (2010)

    Google Scholar 

  34. Blundo, C., Santis, A.D., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. Advances in Cryptology. Lecture Notes in Computer Science, pp. 471–486. Cambridge University Press, Cambridge (1992)

    Google Scholar 

  35. Liu, D., Ning, P.: Security for wireless sensor networks. Advances in Information Security, vol. 28, pp. 63–76. Springer (Dec 2006) (ISBN 0387327231)

    Google Scholar 

  36. Ming, L., Yu, S., Guttman, J.D., Lou, W., Ren K.: Secure ad hoc trust initialization and key management in wireless body area networks. ACM Trans. Sens. Netw. (TOSN) 9(2), 18 (2013)

    Google Scholar 

  37. Spencer, J.: The strange logic of random graphs. Algorithms and Combinatorics 22, Springer-Verlag, (2000). ISBN: 3-540-41654-4

    Google Scholar 

  38. Seema, V.: Analysis of a new random key pre-distribution scheme based on random graph theory and kryptograph. In: Mobile Communication and Power Engineering, pp. 349–352. Springer, Berlin (2013)

    Google Scholar 

  39. Eschenauer, L., Gilgor, V.D.: A key management scheme for distributed sensor networks. In: Proceedings of 9th ACM Conference on Computer and Communications Security, pp. 41–47 (Nov 2002)

    Google Scholar 

  40. Wu, S.-L., Tseng, Y.-C.: Wireless Ad Hoc Networking. Wireless Networks and Mobile Communications Series, Auerbach Publications, USA (2007)

    Google Scholar 

  41. Liu, D., Ning, P.: Establishing Pairwise Keys in Distributed Sensor Networks. Lecture Notes in Computer Science. http://www.cs.iastate.edu/~cs610jw/CS610_LiuNing.ppt (2014). Accessed 15 Jan 2014

  42. Shuang-Hua, Y.: WSN security. In: Wireless Sensor Networks, pp. 187–215. Springer, London (2014)

    Google Scholar 

  43. Zhao, H., Li, Y., Shen, J., Zhang, M., Zheng, R., Wu Q.: A New Secure Geographical Routing Protocol Based on Location Pairwise Keys in Wireless Sensor Networks (2013)

    Google Scholar 

  44. Liu D., Ning, P.: Location-based Pairwise Key Establishments for Static Sensor Networks. In: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, (2003)

    Google Scholar 

  45. Yu, Y., Govindan, R., Estrin D.: Geographical and Energy Aware Routing: a Recursive Data Dissemination Protocol for Wireless Sensor Networks. Technical report ucla/csd-tr-01-0023, UCLA Computer Science Department, (2001)

    Google Scholar 

  46. Jang, J., Kwon, T., Song, J.: A time-based key management protocol for wireless sensor networks. Information Security Practice and Experience, pp. 314–328. Springer, Berlin (2007)

    Google Scholar 

  47. Zhu, S., Setia, S., Jajodia, S.: Leap+: efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. Sen. Netw. 2(4), 500–528 (2002)

    Article  Google Scholar 

  48. Nait Hamoud, O., Kenaza, T., Nouali-Taboudjmat N.: The cloning attack vulnerability in WSN key management schemes. In: SENSORCOMM 2013, The 7th International Conference on Sensor Technologies and Applications, pp. 151–156. (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed Mostafa M. Fouad .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Fouad, M.M.M., Hassanien, A.E. (2014). Key Pre-distribution Techniques for WSN Security Services. In: Hassanien, A., Kim, TH., Kacprzyk, J., Awad, A. (eds) Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations. Intelligent Systems Reference Library, vol 70. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43616-5_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-43616-5_11

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-43615-8

  • Online ISBN: 978-3-662-43616-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics