Abstract
Existing pairwise key establishment schemes for large-scale sensor networks are vulnerable to various passive or active attacks. We classify attacks as selective node capture attacks, node fabrication attacks, and insider attacks. In order to improve the security robustness of random key predistribution and pairwise key establishment schemes against these attacks, we propose a five-phase pairwise key predistribution and pairwise key establishment approach by using area partitioning and multigroup key predistribution. Our security performance studies show that our proposed approach is resilient to selective node capture and node fabrication attacks, and restricts the consequence of any insider attack to a minimal level.
- Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., and Cayirci, E. 2002. A survey on sensor networks. IEEE Commun. Mag. 40, 102--114. Google ScholarDigital Library
- Blom, R. 1985. An optimal class of symmetric key generation systems. In Proceedings of EUROCRYPT'84. Lecture Notes in Computer Science, vol. 209. Springer-Verlag, Berlin, Germany, 335--338. Google ScholarDigital Library
- Blundo, C., Santis, A. D., Herzberg, A., Kutten, S., Vaccaro, U., and Yung, M. 1998. Perfectly-secure key distribution for dynamic conferences. Inform. Computat. 146, 1, 1--23. Google ScholarDigital Library
- Chan, H., Perrig, A., and Song, D. 2003. Random key predistribution schemes for sensor networks. In Proceedings of the 2003 Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA, 197--215. Google ScholarDigital Library
- Di Pietro, R., Mancini, L. V., and Mei, A. 2004. Efficient and resilient key discovery based on pseudo-random key pre-deployment. In Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS). 217.Google Scholar
- Douceur, J. R. 2002. The Sybil attack. In Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS). 251--260. Google ScholarDigital Library
- Du, W., Deng, J., Han, Y. S., Chen, S., and Varshney, P. K. 2004. A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of the IEEE Information Communications Conference (INFOCOM). 586--597.Google Scholar
- Du, W., Deng, J., Han, Y. S., Varshney, P., Katz, J., and Khalili, A. 2005. A pairwise key pre-distribution scheme for wireless sensor networks. ACM Trans. Inform. Syst. Sec. 8, 2, 228--258. Google ScholarDigital Library
- Du, W., Deng, J., Han, Y. S., and Varshney, P. K. 2003. A pairwise key pre-distribution scheme for wireless sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03). 42--51. Google ScholarDigital Library
- Du, W., Fang, L., and Ning, P. 2006. LAD: Localization anomaly detection for wireless sensor networks. J. Parall. Distrib. Comput. 66, 7, 874--886. Google ScholarDigital Library
- Eschenauer, L. and Gligor, V. D. 2002. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communication Security (CCS-02). 41--47. Google ScholarDigital Library
- Ganesan, D., Govindan, R., Shenker, S., and Estrin, D. 2001. Highly-resilient, energy-efficient multipath routing in wireless sensor networks. Mobile Comput. Commun. Rev. 4, 5, 11--25. Google ScholarDigital Library
- Gura, N., Patel, A., and Wander, A. 2004. Comparing elliptic curve cryptography and rsa on 8-bit cpus. In Proceedings of the 2004 Workshop on Cryptographic Hardware and Embedded Systems (CHES). 119--132.Google Scholar
- Huang, D. and Medhi, D. 2005. A Byzantine resilient multi-path key establishment scheme and its robustness analysis for sensor networks. In the 5th IEEE International Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor Networks. 240b.Google Scholar
- Huang, D., Mehta, M., and Medhi, D. 2005. Source routing based pairwise key establishment protocol for sensor networks. In Proceedings of the 24th IEEE International Performance Computing and Communications Conference. 177--183.Google Scholar
- Huang, D., Mehta, M., Medhi, D., and Lein, H. 2004. Location-aware key management scheme for wireless sensor networks. In Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN). 29--42. Google ScholarDigital Library
- Huang, D., Mehta, M., van de Liefvoort, A., and Medhi, D. 2007. Modeling pairwise key establishment for random key predistribution in large-scale sensor networks. IEEE/ACM Trans. Netw. In Press. Google ScholarDigital Library
- Kahn, J. M., Katz, R. H., and Pister, K. S. J. 1999. Next century challenges: Mobile networking for “Smart Dust”. In Proceedings of the International Conference on Mobile Computing and Networking (MOBICOM). 271--278. Google ScholarDigital Library
- Karlof, C. and Wagner, D. 2003. Secure routing in wireless sensor networks: Attacks and countermeasures. AdHoc Netw. J. (Special issue on Sensor Network Applications and Protocols) 1, 2--3 (Sept.), 293--315.Google Scholar
- Koç, C. K. 1994. High-speed RSA implementation. Tech. rep. 201, RSA Laboratories, Bedford, MA.Google Scholar
- Lindsey, S. and Raghavendra, C. S. 2002. Pegasis: Power efficient gathering in sensor information systems. In Proceedings of the IEEE Aerospace Conference. 1125--1130.Google Scholar
- Liu, D. and Ning, P. 2003a. Establishing pairwise keys in distributed sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03). 52--61. Google ScholarDigital Library
- Liu, D. and Ning, P. 2003b. Location-based pairwise key establishments for static sensor networks. In Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (CCS'03). 72--82. Google ScholarDigital Library
- Liu, D. and Ning, P. 2005. Improving key pre-distribution with deployment knowledge in static sensor networks. ACM Trans. Sens. Netw. 1, 2(Nov.) 204--239. Google ScholarDigital Library
- Liu, D., Ning, P., and Du, W. 2005a. Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In Proceedings of the the 25th International Conference on Distributed Computing Systems. 609--619. Google ScholarDigital Library
- Liu, D., Ning, P., and Du, W. 2005b. Group based key predistribution in wireless sensor networks. In Proceedings of the ACM Workshop on Wireless Security (WiSe). 11--20. Google ScholarDigital Library
- Liu, D., Ning, P., and Li, R. 2005c. Establishing pairwise keys in distributed sensor networks. ACM Trans. Inform. Syst. Sec. 8, 1, 41--77. Google ScholarDigital Library
- Manjeshwar, A. and Agrawal, D. P. 2001. TEEN: A routing protocol for enhanced efficiency in wireless sensor networks. In Proceedings of the 15th International Parallel and Distributed Processing Symposium Workshops (IPDPS). 30189a. Google ScholarDigital Library
- Mehta, M., Huang, D., and Harn, L. 2005. RINK-RKP: A scheme for key predistribution and shared-key discovery in sensor networks. In Proceedings of the 24th IEEE International Performance Computing and Communications Conference. 193--197.Google Scholar
- Parno, B., Perrig, A., and Gligor, V. 2005. Distributed detection of node replication attacks in sensor networks. In Proceedings of the IEEE Symposium on Security and Privacy. 49--63. Google ScholarDigital Library
- Pottie, G. J. and Kaiser, W. J. 2000. Wireless integrated network sensors. Commun. ACM 43, 5 (May), 51--58. Google ScholarDigital Library
- Reed, I. S. and Solomon, G. 1960. Polynomial codes over certain finite fields. SIAM J. Appl. Math 8, 300--304.Google ScholarCross Ref
- Sarwate, D. V. 1977. On the complexity of decoding goppa codes. IEEE Trans. Inform. Theor. 23, 4, 515--516.Google ScholarDigital Library
- Spencer, J. H. 2001. The Strange Logic of Random Graphs (Algorithms and Combinatorics). Springer Verlag, Berlin, Germany.Google Scholar
- Tsirigos, A. and Haas, Z. J. 2004. Analysis of multipath routing part I: The effect on the packet delivery ratio. IEEE Trans. Wireless Commun. 3, 1, 138--146. Google ScholarDigital Library
- Wicker, S. B. 1995. Error Control Coding for Digital Communication and Storage. Prentice-Hall, Englewod Cliffs, NJ. Google ScholarDigital Library
- Zhu, S., Xu, S., Setia, S., and Jajodia, S. 2003. Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach. In Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP). 326--335. Google ScholarDigital Library
Index Terms
- Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach
Recommendations
An Efficient Pairwise Key Establishment Scheme for Sensor Networks
ETCS '11: Proceedings of the 2011 Third International Workshop on Education Technology and Computer Science - Volume 02Pair key establishment is a fundamental security service in wireless sensor networks (WSNs); it enables sensor nodes to communicate securely with each other using cryptographic techniques. However, due to the resource constraints, establishing pairwise ...
In situ key establishment in large-scale sensor networks
Special issue on wireless network securityDue to its efficiency, symmetric key cryptography is very attractive in sensor networks. A number of key predistribution schemes have been proposed, but the scalability is often constrained by the unavailability of topology information before deployment ...
Modeling pairwise key establishment for random key predistribution in large-scale sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys are required to be established between them. Considering the storage limitations and the lack of post-deployment ...
Comments