skip to main content
10.1145/1582379.1582438acmconferencesArticle/Chapter ViewAbstractPublication PagesiwcmcConference Proceedingsconference-collections
research-article

A key pre-distribution scheme for heterogeneous sensor networks

Published:21 June 2009Publication History

ABSTRACT

Key pre-distribution techniques developed recently to establish pairwise keys between nodes with no or limited mobility. Existing schemes make use of only one key pool to establish secure links between stationary and mobile nodes, allowing an attacker to easily gain control of the network by randomly compromising a small fraction of stationary nodes. A method of preventing this type of security breach is the use of separate key pools for mobile and stationary nodes, in which small fractions of stationary nodes are randomly pre-selected to help the mobile nodes establish links with stationary nodes. Analysis shows that with 10% of stationary nodes carry a key from the mobile key pool. To recover any key from the mobile key pool and gain control of the network, an attacker would have to capture 20.8 times more stationary nodes than if a single key pool is used for both mobile and stationary nodes.

References

  1. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. Wireless sensor networks: A survey. Computer Networks, 38(4):393--422, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. T. Gao, D. Greenspan, M. Welesh, R. R. Juang, and A. Alm. Vital signs monitoring and patient tracking over a wireless network. In the 27th Annual International Conference of IEEE EMBS, Shanghai, China, September 2005.Google ScholarGoogle Scholar
  3. L. Gu, D. Jia, P. Vicaire, T. Yan, L. Luo, A. Tirumala, Q. Cao, T. He, J. A. Stankovic, T. Abdelzaher, and B. H. Krogh, "Lightweight detection and classification for wireless sensor networks in realistic environments, "In the 3rd ACM Conference on Embedded Networked Sensor Systems, San Diego, USA, November 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. Kahn, R. Katz, and K. Pister, "Next century challenges: Mobile networking for smart dust," In the ACM International Conference on Mobile Computing and Networking (MobiCom'99), Seattle, USA, August 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. H. Chan, A. Perrig, and D. Song. Key distribution techniques for sensor networks. Wireless Sensor Networks ISBN:1-4020-7883-8, pages 277--303. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. H. Chan, A. Perrig, and D. Song. Random key pre-distribution schemes for sensor networks. In IEEE Symposium on Research in Security and Privac, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In Proc. ACM Conference Computer Communication Security (CCS'02). DC: ACM Press, 2002, pp. 41--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. D. Liu and P. Ning. Location-based pairwise key establishments for static sensor networks. ACM workshop on Securityin Ad Hoc and Sensor Networks, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. D. Liu, P. Ning, and R. Li. Establishing Pairwise keys in Distributed Sensor Networks. 10th ACM conference on Computers and Communication Security (CCS 03). Pages 52--61, Oct 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Zhu, S. Setia, and S. Jajodia. Leap: Efficient security mechanisms for large-scale distributed sensor networks. 10th ACM conference on Computers and Communication Security (CCS 03), pages 62--72, Oct 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly-secure key distributoin for dynamic conferences. In Advances in Cryptology -- CRYPTO '92, LNCS 740, pages 471--486, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A key pre-distribution scheme for heterogeneous sensor networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        IWCMC '09: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
        June 2009
        1561 pages
        ISBN:9781605585697
        DOI:10.1145/1582379

        Copyright © 2009 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 21 June 2009

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader