ABSTRACT
The recent research in sensor networks has led to a number of security schemes. The main requirement of wireless sensor networks is not only security but energy efficient security due to resource constrained nature of sensor nodes. We have developed an energy and storage efficient key distribution scheme using leveling and sectoring. In this scheme, node communicates with their neighbors to setup pair wise keys without any central authority. Proposed protocol is fully distributed and uses negligible communication for key setups between different nodes. Distributed nature of this protocol makes it more faults tolerant. Pair wise keys are different for each pair of nodes, so a small part of network is affected due to node compromise attacks. It is fully developed in TinyOS-2.x and tested in avrora emulator. We are also planning to add code of this key management protocol in TinyOS-2.x contributory section. Use of level and sector also solves problem of localization.
- L. Eschenauer and V. Gligor: A Key Management Scheme for Distributed Sensor Networks. In proceedings of 9th ACM Conf. Computer and Communication Security. pp. 41--47 (2002). Google ScholarDigital Library
- H. Chan, A. Perrig, and D. Song: Random Key Predistribution Schemes for Sensor Networks. In Proceedings of IEEE Security and Privacy symposium. pp(197--213), 2003. Google ScholarDigital Library
- W. Du et al.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In IEEE INFOCOM '04. (2004).Google Scholar
- Liu and P. Ning: Improving Key Pre-Distribution with Deployment Knowledge in Static Sensor Networks. ACM Trans. On Sensor Networks, (2005). Google ScholarDigital Library
- M. Eltoweissy et al.: Group Key Management Scheme for Large-Scale Wireless Sensor Network. J. Ad Hoc Networks, Sept. '05, 796--802 (2005). Google ScholarDigital Library
- M. Younis, K. Ghumman, and M. Eltoweissy: Location aware Combinatorial Key Management Scheme for Clustered Sensor Networks. IEEE Trans. Parallel and Distributed System. (2006). Google ScholarDigital Library
- Adrian Perrig, John Stankovic and David Wagner: Security in wireless sensor networks, Communications of the ACM, vol.47, No.6, June 2004. Google ScholarDigital Library
- Qi Dong and Donggang Liu: Using Auxiliary Sensors for Pairwise Key Establishment in WSN in Proceedings of 2007 IFIP International Conferences on Networking (Networking 2007). Google ScholarDigital Library
- Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, D.: SPINS: Security protocols for sensor networks. In Proceedings of Seventh Annual International Conference on Mobile Computing and Networks. (July 2001). Google ScholarDigital Library
- M. Eltoweissy, M Moharrum and R. Mukkamala: Dynamic key management in sensor network. IEEE Communications magazine, April '06, 122--130 (2006) 22. Google ScholarDigital Library
- Eschenauer, L., Gligor, V. D.: A Key-management Scheme for Distributed Sensor Networks. In Proceedings of the 9th ACM Conference on Computer and Communication Security, pp. 41--47 (2002). Google ScholarDigital Library
- Choi, S. J., Youn, H. Y.: An Efficient Key Pre-distribution Scheme for Secure Distributed Sensor Network. In Yang, L. T., Amamiya, M., Liu, Z., Guo, M., Rammig, F. J. (eds.) EUC 2005. LNCS, vol. 3824. Springer, Heidelberg (2005). Google ScholarDigital Library
- Duncan S. Wong and Agnes H. Chan. Efficient and mutually authenticated key exchange for low power computing devices. In Advances in Cryptology ASIACRYPT '2001, 2001. Google ScholarDigital Library
- D. Liu, P. Ning and R. Li, Establishing pairwise keys in distributed sensor networks, J. ACM Comput. Comm. Security 8 (1) (2005), pp. 41--77. Google ScholarDigital Library
- S. A. Camtepe and B. Yener, "Key distribution mechanisms for wireless sensor networks: a survey," Rensselaer Polytechnic Institute, Computer Science Department, Tech. Rep. 05-07, March 2005.Google Scholar
- W. Du, J. Deng, Y. S. Han, S. Chen, and P. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of IEEE INFOCOM'04, March 2004.Google Scholar
- D. Huang, M. Mehta, D. Medhi, and L. Harn. Location-aware key management scheme for wireless sensor networks. In Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks (SASN '04), pages 29--42, October 2004. Google ScholarDigital Library
- D. Liu and P. Ning. Location-based pairwise key establishments for static sensor networks. In 2003 ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN '03), pages 72--82, October 2003. Google ScholarDigital Library
- Z. Yu and Y. Guan. A key pre-distribution scheme using deployment knowledge for wireless sensor networks. In Proceedings of ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), April 2005. Google ScholarDigital Library
- Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou, Providing Transparent Security Services to Sensor Networks. In Proceedings of IEEE International Conference on Communication (ICC'07). 24-28 June 2007.Google Scholar
- www.tinyos.netGoogle Scholar
- AVR Simulation and Analysis Framework www. compilers.cs.ucla.edu/avrora/Google Scholar
Index Terms
- Distributed key management for wireless sensor networks
Recommendations
Hexagonal groups based key management using deployment knowledge in wireless sensor networks
ICACCI '12: Proceedings of the International Conference on Advances in Computing, Communications and InformaticsWireless sensor network (WSN) consists of large number of sensor nodes, which may be deployed in hostile environment. Hence, to provide security, the communication among sensor node is to be protected using encryption. Because of the resource ...
Relay Node Placement in Wireless Sensor Networks
A wireless sensor network consists of many low-cost, low-power sensor nodes, which can perform sensing, simple computation, and transmission of sensed information. Long distance transmission by sensor nodes is not energy efficient since energy ...
Sensor scheduling for p-percent coverage in wireless sensor networks
We study sensor scheduling problems of p-percent coverage in this paper and propose two scheduling algorithms to prolong network lifetime due to the fact that for some applications full coverage is not necessary and different subareas of the monitored ...
Comments