skip to main content
10.1145/1641944.1641950acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

Distributed key management for wireless sensor networks

Authors Info & Claims
Published:28 October 2009Publication History

ABSTRACT

The recent research in sensor networks has led to a number of security schemes. The main requirement of wireless sensor networks is not only security but energy efficient security due to resource constrained nature of sensor nodes. We have developed an energy and storage efficient key distribution scheme using leveling and sectoring. In this scheme, node communicates with their neighbors to setup pair wise keys without any central authority. Proposed protocol is fully distributed and uses negligible communication for key setups between different nodes. Distributed nature of this protocol makes it more faults tolerant. Pair wise keys are different for each pair of nodes, so a small part of network is affected due to node compromise attacks. It is fully developed in TinyOS-2.x and tested in avrora emulator. We are also planning to add code of this key management protocol in TinyOS-2.x contributory section. Use of level and sector also solves problem of localization.

References

  1. L. Eschenauer and V. Gligor: A Key Management Scheme for Distributed Sensor Networks. In proceedings of 9th ACM Conf. Computer and Communication Security. pp. 41--47 (2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. H. Chan, A. Perrig, and D. Song: Random Key Predistribution Schemes for Sensor Networks. In Proceedings of IEEE Security and Privacy symposium. pp(197--213), 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. W. Du et al.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In IEEE INFOCOM '04. (2004).Google ScholarGoogle Scholar
  4. Liu and P. Ning: Improving Key Pre-Distribution with Deployment Knowledge in Static Sensor Networks. ACM Trans. On Sensor Networks, (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Eltoweissy et al.: Group Key Management Scheme for Large-Scale Wireless Sensor Network. J. Ad Hoc Networks, Sept. '05, 796--802 (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Younis, K. Ghumman, and M. Eltoweissy: Location aware Combinatorial Key Management Scheme for Clustered Sensor Networks. IEEE Trans. Parallel and Distributed System. (2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Adrian Perrig, John Stankovic and David Wagner: Security in wireless sensor networks, Communications of the ACM, vol.47, No.6, June 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Qi Dong and Donggang Liu: Using Auxiliary Sensors for Pairwise Key Establishment in WSN in Proceedings of 2007 IFIP International Conferences on Networking (Networking 2007). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, D.: SPINS: Security protocols for sensor networks. In Proceedings of Seventh Annual International Conference on Mobile Computing and Networks. (July 2001). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. Eltoweissy, M Moharrum and R. Mukkamala: Dynamic key management in sensor network. IEEE Communications magazine, April '06, 122--130 (2006) 22. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Eschenauer, L., Gligor, V. D.: A Key-management Scheme for Distributed Sensor Networks. In Proceedings of the 9th ACM Conference on Computer and Communication Security, pp. 41--47 (2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Choi, S. J., Youn, H. Y.: An Efficient Key Pre-distribution Scheme for Secure Distributed Sensor Network. In Yang, L. T., Amamiya, M., Liu, Z., Guo, M., Rammig, F. J. (eds.) EUC 2005. LNCS, vol. 3824. Springer, Heidelberg (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Duncan S. Wong and Agnes H. Chan. Efficient and mutually authenticated key exchange for low power computing devices. In Advances in Cryptology ASIACRYPT '2001, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. D. Liu, P. Ning and R. Li, Establishing pairwise keys in distributed sensor networks, J. ACM Comput. Comm. Security 8 (1) (2005), pp. 41--77. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. A. Camtepe and B. Yener, "Key distribution mechanisms for wireless sensor networks: a survey," Rensselaer Polytechnic Institute, Computer Science Department, Tech. Rep. 05-07, March 2005.Google ScholarGoogle Scholar
  16. W. Du, J. Deng, Y. S. Han, S. Chen, and P. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of IEEE INFOCOM'04, March 2004.Google ScholarGoogle Scholar
  17. D. Huang, M. Mehta, D. Medhi, and L. Harn. Location-aware key management scheme for wireless sensor networks. In Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks (SASN '04), pages 29--42, October 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. D. Liu and P. Ning. Location-based pairwise key establishments for static sensor networks. In 2003 ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN '03), pages 72--82, October 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Z. Yu and Y. Guan. A key pre-distribution scheme using deployment knowledge for wireless sensor networks. In Proceedings of ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), April 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Hamed Soroush, Mastooreh Salajegheh and Tassos Dimitriou, Providing Transparent Security Services to Sensor Networks. In Proceedings of IEEE International Conference on Communication (ICC'07). 24-28 June 2007.Google ScholarGoogle Scholar
  21. www.tinyos.netGoogle ScholarGoogle Scholar
  22. AVR Simulation and Analysis Framework www. compilers.cs.ucla.edu/avrora/Google ScholarGoogle Scholar

Index Terms

  1. Distributed key management for wireless sensor networks

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        Q2SWinet '09: Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
        October 2009
        120 pages
        ISBN:9781605586199
        DOI:10.1145/1641944

        Copyright © 2009 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 28 October 2009

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate46of131submissions,35%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader