Browse > Article

Distributed Key Management Using Regression Model for Hierarchical Mobile Sensor Networks  

Kim Mi-Hui (Ewha Womans University)
Chae Ki-Joon (Ewha Womans University)
Publication Information
Abstract
In this paper, we introduce a novel key management scheme that is based on the key pre-distribution but provides the key re-distribution method, in order to manage keys for message encryption and authentication of lower-layer sensor nodes on hierarchical mobile sensor networks. The characteristics of our key management are as follows: First, the role of key management is distributed to aggregator nodes as well as a sink node, to overcome the weakness of centralized management. Second, a sink node generates keys using regression model, thus it stores only the information for calculating the keys using the key information received from nodes, but does not store the relationship between a node and a key, and the keys themselves. As the disadvantage of existing key pre-distributions, they do not support the key re-distribution after the deployment of nodes, and it is hard to extend the key information in the case that sensor nodes in the network enlarge. Thirdly, our mechanism provides the resilience to node capture(${\lambda}$-security), also provided by the existing key pre-distributions, and fourth offers the key freshness through key re-distribution, key distribution to mobile nodes, and scalability to make up for the weak points in the existing key pre-distributions. Fifth, our mechanism does not fix the relationship between a node and a key, thus supports the anonymity and untraceability of mobile nodes. Lastly, we compare ours with existing mechanisms, and verify our performance through the overhead analysis of communication, computation, and memory.
Keywords
계층적인 이동 센서 네트워크;분산 키 관리 메커니즘;회귀모델;키 선분배;키 재분배;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 G. Gaubatz, J. P. Kaps and B. Sunar, 'Public Key Cryptography in Sensor Networks-Revisited,' 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS), LNCS 3313, pp. 2-18, August 2004
2 D. J. Malan, M. Welsh and M. D. Smith, 'A Public- Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography,' 1st IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON), October 2004   DOI
3 J. Ding, K. Sivalingam and B. Li, 'Design and Analysis of an Integrated MAC and Routing Protocol Framework for Wireless Sensor Networks,' Int. Journal on Ad Hoc & Sensor Wireless Networks, March 2005
4 H. Chan, A. Perrig and D. Song, 'Random Key Predistribution Schemes for Sensor Networks,' 2003 IEEE Symposium on Security and Privacy, pp. 197-213, 2003
5 F. Ye, H. Luo, J. Cheng, S. Lu and L. Zhang, 'A Two-tier Data Dissemination Model for Large-scale Wireless Sensor Networks,' ACM/IEEE Mobicom, 2002   DOI
6 C. Intanagonwiwat, R. Govindan, D. Estrin, J. Heidemann, and F. Silva. 'Directed Diffusion for Wireless Sensor Networking,' ACM/IEEE Transactions on Networking, 11(1), pp. 2-16, February 2002   DOI   ScienceOn
7 W. Du, J. Deng, Y. S. Han and P. Varshney, 'A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks,' 10th ACM Conference on Computer and Communications Security (CCS), October 2003   DOI
8 D. Liu and P. Ning, 'Establishing Pairwise Keys in Distributed Sensor Networks,' 10th ACM Conference on Computer and Communications Security (CCS), pp. 52-61, October 2003   DOI
9 S. Schmidt, H. Krahn, S. Fischer and D. Watjen, 'A Security Architecture for Mobile Wireless Sensor Networks,' ESAS, LNCS 3313, pp. 166-177, 2005   DOI
10 S. Avancha, J. Undercoffer, A. Joshi and J. Pinkston, 'Secure sensor networks for perimeter protection,' Computer Networks: The Inter-national Journal of Computer and Telecommuni-cations Networking, Vol. 43, Issue 4, pp. 421 - 435, November 2003   DOI   ScienceOn
11 박성현, '제3판 희귀분석,' 민영사, 1998년 9월
12 X. Chen and J. Drissi, 'An Efficient Key Management Scheme in Hierarchical Sensor Networks,' MASS 2005   DOI
13 M. Tubaishat, J. Yin, B. Panja and S. Madria, 'A Secure Hierarchical Model for Sensor Networ,' SIGMOD Record, Vol. 33, No.1, pp. 7-13, March 2004   DOI   ScienceOn
14 H. Chan and A. Perrig, 'PIKE: Peer Inter-mediaries for Key Establishment,' IEEE INFOCOM, March 2005   DOI
15 S. Schmidt, H. Krahn, S. Fischer and D. Watjen, 'A Security Architecture for Mobile Wireless Sensor Networks,' 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS), LNCS 3313, August 2004
16 Y. T. Hou, Y. Shi and H. D. Sherali, 'Rate Allocation in Wireless Sensor Networks with Network Lifetime Requirement,' MobiHoc, pp. 67-77, 2004   DOI
17 임채훈, '유비쿼터스 센서 네트워크 보안,' 한국통신학회지, 정보통신 Vol. 22, no. 8, August 2005   과학기술학회마을
18 F. Hu and X. Cao, 'Security in Wireless Actor & Sensor Networks (WASN): Towards A Hierarchical Re-Keying Desig,.' International Conference on Information Technology: Coding and Computing, pp. 528-533, 2005   DOI
19 J. D. Richard and S. Mishra, 'Security Support for In-Network Processing in Wireless Sensor Networks,' ACM Workshop on the Security of Ad hoc and Sensor Network, pp. 83-93, 2003   DOI
20 M. Bohge and W. Trappe, 'An Authentication Framework for Hierarchical Ad-hoc Sensor Networks,' ACM Workshop on Wireless Security (WiSe), 2003   DOI
21 C. Karlof, N. Sastry and D. Wagner, 'TinySec: A Link Layer Security Architecture for Wireless Sensor Networks,' 2nd ACM Conference on Embedded Networked Sensor Systems, Nov.2004   DOI
22 A. Perrig, R. Szewczyk, V. Wen, D. Culler and J. D. Tygar, 'SPINS: Security Protocols for Sensor Networks,' Wireless Networks Journal (WINE), September 2002   DOI   ScienceOn