skip to main content
article

Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach

Published:01 August 2007Publication History
Skip Abstract Section

Abstract

Existing pairwise key establishment schemes for large-scale sensor networks are vulnerable to various passive or active attacks. We classify attacks as selective node capture attacks, node fabrication attacks, and insider attacks. In order to improve the security robustness of random key predistribution and pairwise key establishment schemes against these attacks, we propose a five-phase pairwise key predistribution and pairwise key establishment approach by using area partitioning and multigroup key predistribution. Our security performance studies show that our proposed approach is resilient to selective node capture and node fabrication attacks, and restricts the consequence of any insider attack to a minimal level.

References

  1. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., and Cayirci, E. 2002. A survey on sensor networks. IEEE Commun. Mag. 40, 102--114. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Blom, R. 1985. An optimal class of symmetric key generation systems. In Proceedings of EUROCRYPT'84. Lecture Notes in Computer Science, vol. 209. Springer-Verlag, Berlin, Germany, 335--338. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Blundo, C., Santis, A. D., Herzberg, A., Kutten, S., Vaccaro, U., and Yung, M. 1998. Perfectly-secure key distribution for dynamic conferences. Inform. Computat. 146, 1, 1--23. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Chan, H., Perrig, A., and Song, D. 2003. Random key predistribution schemes for sensor networks. In Proceedings of the 2003 Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA, 197--215. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Di Pietro, R., Mancini, L. V., and Mei, A. 2004. Efficient and resilient key discovery based on pseudo-random key pre-deployment. In Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS). 217.Google ScholarGoogle Scholar
  6. Douceur, J. R. 2002. The Sybil attack. In Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS). 251--260. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Du, W., Deng, J., Han, Y. S., Chen, S., and Varshney, P. K. 2004. A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of the IEEE Information Communications Conference (INFOCOM). 586--597.Google ScholarGoogle Scholar
  8. Du, W., Deng, J., Han, Y. S., Varshney, P., Katz, J., and Khalili, A. 2005. A pairwise key pre-distribution scheme for wireless sensor networks. ACM Trans. Inform. Syst. Sec. 8, 2, 228--258. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Du, W., Deng, J., Han, Y. S., and Varshney, P. K. 2003. A pairwise key pre-distribution scheme for wireless sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03). 42--51. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Du, W., Fang, L., and Ning, P. 2006. LAD: Localization anomaly detection for wireless sensor networks. J. Parall. Distrib. Comput. 66, 7, 874--886. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Eschenauer, L. and Gligor, V. D. 2002. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communication Security (CCS-02). 41--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Ganesan, D., Govindan, R., Shenker, S., and Estrin, D. 2001. Highly-resilient, energy-efficient multipath routing in wireless sensor networks. Mobile Comput. Commun. Rev. 4, 5, 11--25. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Gura, N., Patel, A., and Wander, A. 2004. Comparing elliptic curve cryptography and rsa on 8-bit cpus. In Proceedings of the 2004 Workshop on Cryptographic Hardware and Embedded Systems (CHES). 119--132.Google ScholarGoogle Scholar
  14. Huang, D. and Medhi, D. 2005. A Byzantine resilient multi-path key establishment scheme and its robustness analysis for sensor networks. In the 5th IEEE International Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor Networks. 240b.Google ScholarGoogle Scholar
  15. Huang, D., Mehta, M., and Medhi, D. 2005. Source routing based pairwise key establishment protocol for sensor networks. In Proceedings of the 24th IEEE International Performance Computing and Communications Conference. 177--183.Google ScholarGoogle Scholar
  16. Huang, D., Mehta, M., Medhi, D., and Lein, H. 2004. Location-aware key management scheme for wireless sensor networks. In Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN). 29--42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Huang, D., Mehta, M., van de Liefvoort, A., and Medhi, D. 2007. Modeling pairwise key establishment for random key predistribution in large-scale sensor networks. IEEE/ACM Trans. Netw. In Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Kahn, J. M., Katz, R. H., and Pister, K. S. J. 1999. Next century challenges: Mobile networking for “Smart Dust”. In Proceedings of the International Conference on Mobile Computing and Networking (MOBICOM). 271--278. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Karlof, C. and Wagner, D. 2003. Secure routing in wireless sensor networks: Attacks and countermeasures. AdHoc Netw. J. (Special issue on Sensor Network Applications and Protocols) 1, 2--3 (Sept.), 293--315.Google ScholarGoogle Scholar
  20. Koç, C. K. 1994. High-speed RSA implementation. Tech. rep. 201, RSA Laboratories, Bedford, MA.Google ScholarGoogle Scholar
  21. Lindsey, S. and Raghavendra, C. S. 2002. Pegasis: Power efficient gathering in sensor information systems. In Proceedings of the IEEE Aerospace Conference. 1125--1130.Google ScholarGoogle Scholar
  22. Liu, D. and Ning, P. 2003a. Establishing pairwise keys in distributed sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS'03). 52--61. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Liu, D. and Ning, P. 2003b. Location-based pairwise key establishments for static sensor networks. In Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (CCS'03). 72--82. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Liu, D. and Ning, P. 2005. Improving key pre-distribution with deployment knowledge in static sensor networks. ACM Trans. Sens. Netw. 1, 2(Nov.) 204--239. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Liu, D., Ning, P., and Du, W. 2005a. Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In Proceedings of the the 25th International Conference on Distributed Computing Systems. 609--619. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Liu, D., Ning, P., and Du, W. 2005b. Group based key predistribution in wireless sensor networks. In Proceedings of the ACM Workshop on Wireless Security (WiSe). 11--20. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Liu, D., Ning, P., and Li, R. 2005c. Establishing pairwise keys in distributed sensor networks. ACM Trans. Inform. Syst. Sec. 8, 1, 41--77. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Manjeshwar, A. and Agrawal, D. P. 2001. TEEN: A routing protocol for enhanced efficiency in wireless sensor networks. In Proceedings of the 15th International Parallel and Distributed Processing Symposium Workshops (IPDPS). 30189a. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Mehta, M., Huang, D., and Harn, L. 2005. RINK-RKP: A scheme for key predistribution and shared-key discovery in sensor networks. In Proceedings of the 24th IEEE International Performance Computing and Communications Conference. 193--197.Google ScholarGoogle Scholar
  30. Parno, B., Perrig, A., and Gligor, V. 2005. Distributed detection of node replication attacks in sensor networks. In Proceedings of the IEEE Symposium on Security and Privacy. 49--63. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Pottie, G. J. and Kaiser, W. J. 2000. Wireless integrated network sensors. Commun. ACM 43, 5 (May), 51--58. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Reed, I. S. and Solomon, G. 1960. Polynomial codes over certain finite fields. SIAM J. Appl. Math 8, 300--304.Google ScholarGoogle ScholarCross RefCross Ref
  33. Sarwate, D. V. 1977. On the complexity of decoding goppa codes. IEEE Trans. Inform. Theor. 23, 4, 515--516.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Spencer, J. H. 2001. The Strange Logic of Random Graphs (Algorithms and Combinatorics). Springer Verlag, Berlin, Germany.Google ScholarGoogle Scholar
  35. Tsirigos, A. and Haas, Z. J. 2004. Analysis of multipath routing part I: The effect on the packet delivery ratio. IEEE Trans. Wireless Commun. 3, 1, 138--146. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Wicker, S. B. 1995. Error Control Coding for Digital Communication and Storage. Prentice-Hall, Englewod Cliffs, NJ. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Zhu, S., Xu, S., Setia, S., and Jajodia, S. 2003. Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach. In Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP). 326--335. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader