ABSTRACT
Key pre-distribution techniques developed recently to establish pairwise keys between nodes with no or limited mobility. Existing schemes make use of only one key pool to establish secure links between stationary and mobile nodes, allowing an attacker to easily gain control of the network by randomly compromising a small fraction of stationary nodes. A method of preventing this type of security breach is the use of separate key pools for mobile and stationary nodes, in which small fractions of stationary nodes are randomly pre-selected to help the mobile nodes establish links with stationary nodes. Analysis shows that with 10% of stationary nodes carry a key from the mobile key pool. To recover any key from the mobile key pool and gain control of the network, an attacker would have to capture 20.8 times more stationary nodes than if a single key pool is used for both mobile and stationary nodes.
- I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. Wireless sensor networks: A survey. Computer Networks, 38(4):393--422, 2002. Google ScholarDigital Library
- T. Gao, D. Greenspan, M. Welesh, R. R. Juang, and A. Alm. Vital signs monitoring and patient tracking over a wireless network. In the 27th Annual International Conference of IEEE EMBS, Shanghai, China, September 2005.Google Scholar
- L. Gu, D. Jia, P. Vicaire, T. Yan, L. Luo, A. Tirumala, Q. Cao, T. He, J. A. Stankovic, T. Abdelzaher, and B. H. Krogh, "Lightweight detection and classification for wireless sensor networks in realistic environments, "In the 3rd ACM Conference on Embedded Networked Sensor Systems, San Diego, USA, November 2005. Google ScholarDigital Library
- J. Kahn, R. Katz, and K. Pister, "Next century challenges: Mobile networking for smart dust," In the ACM International Conference on Mobile Computing and Networking (MobiCom'99), Seattle, USA, August 1999. Google ScholarDigital Library
- H. Chan, A. Perrig, and D. Song. Key distribution techniques for sensor networks. Wireless Sensor Networks ISBN:1-4020-7883-8, pages 277--303. Google ScholarDigital Library
- H. Chan, A. Perrig, and D. Song. Random key pre-distribution schemes for sensor networks. In IEEE Symposium on Research in Security and Privac, 2003. Google ScholarDigital Library
- L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In Proc. ACM Conference Computer Communication Security (CCS'02). DC: ACM Press, 2002, pp. 41--47. Google ScholarDigital Library
- D. Liu and P. Ning. Location-based pairwise key establishments for static sensor networks. ACM workshop on Securityin Ad Hoc and Sensor Networks, 2003. Google ScholarDigital Library
- D. Liu, P. Ning, and R. Li. Establishing Pairwise keys in Distributed Sensor Networks. 10th ACM conference on Computers and Communication Security (CCS 03). Pages 52--61, Oct 2003. Google ScholarDigital Library
- S. Zhu, S. Setia, and S. Jajodia. Leap: Efficient security mechanisms for large-scale distributed sensor networks. 10th ACM conference on Computers and Communication Security (CCS 03), pages 62--72, Oct 2003. Google ScholarDigital Library
- C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly-secure key distributoin for dynamic conferences. In Advances in Cryptology -- CRYPTO '92, LNCS 740, pages 471--486, 1993. Google ScholarDigital Library
Index Terms
- A key pre-distribution scheme for heterogeneous sensor networks
Recommendations
An efficient and scalable pairwise key pre-distribution scheme for sensor networks using deployment knowledge
Pairwise key establishment is a fundamental security service for sensor networks. However, establishing pairwise key in sensor networks is a challenging problem, particularly due to the resource constraints on sensor nodes and the threat of node ...
Simple, extensible and flexible random key predistribution schemes for wireless sensor networks using reusable key pools
Sensor nodes are tiny, low-power, computationally limited and battery constrained electromechanical devices. A sensor node contains a sensing unit and a wireless communication unit. Sensor nodes are deployed over a field for sensing an event data in the ...
A pairwise key pre-distribution scheme for wireless sensor networks
CCS '03: Proceedings of the 10th ACM conference on Computer and communications securityTo achieve security in wireless sensor networks, it is important to be able to encrypt and authenticate messages sent among sensor nodes. Keys for encryption and authentication purposes must be agreed upon by communicating nodes. Due to resource ...
Comments