Browse > Article

Strongly-Connected Hierarchical Grid-Based Pairwise Key Predistribution Scheme for Static Wireless Sensor Networks  

Nyang Dae-Hun (Graduate School of Information Technology and Telecommunication, Inha University)
Abedelaziz Mohaisen (Graduate School of Information Technology and Telecommunication, Inha University)
Publication Information
Abstract
Wireless Sensor Network(WSN) consists of huge number of sensor nodes which are small and inexpensive with very limited resources. The public key cryptography is undesirable to be used in WSN because of the limitations of the resources. A key management and predistribution techniques are required to apply the symmetric key cryptography in such a big network. Many key predistribution techniques and approaches have been proposed, but most of-them didn't consider the real WSN assumptions, In this paper, we propose a security framework that is based on a hierarchical grid for WSN considering the proper assumptions of the communication traffic and required connectivity. We apply simple keying material distribution scheme to measure the value of our framework. Finally, we provide security analysis for possible security threats in WSN.
Keywords
Wireless Sensor Networks; Pair-wise Key; Hierarchical Grid;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Schmidt, JS. , Krahn, H., Fischer, S., Watjen, D.: A Security Architecture for Mobile Wireless Sensor Networks, Security in Ad-hoc and Sensor Networks, LNCS 3313, pp 166-177, Springer-Verlag Berlin Heidelberg 2005
2 Hwang, J. M., Kim, Y. D.: Revisiting random key pre-distribution schemes for wireless sensor networks, Workshop on Security of ad hoc and Sensor Networks archive, Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 43-52, 2004   DOI
3 Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks, IEEE Symposium on Security and Privacy, pp. 197-213, May 2003
4 Blundo, C., DE Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., and Yung, M.: Perfectly secure key distribution for dynamic conferences,' In Advances in Cryptology - CRYPTO '92, LNCS 740, pp. 471-486, 1993
5 Newsome, J., Shi, E., Song D., Perrig A.: The Sybil Attack in Sensor Networks: Analysis and Defense., In Proceedings of Information Processing in Sensor Networks (IPSN), April 2004   DOI
6 Blom, R.: An optimal class of symmetric key generation systems, Advances in Cryptography, Proceedings EUROCRYPT 84, LNCS, Springer-Verlag, 209, pp. 335-338, 1985
7 Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: A Survey, Computer Networks (Elsevier) Journal, Vol. 38, No. 4, pp. 393-422, March 2002   DOI   ScienceOn
8 Wood, A.,Stankovic, J. A.: Denial of Service in Sensor Networks, IEEE Computer, 35(10): pp. 54-62, October 2002   DOI   ScienceOn
9 Perrig, A., Szewczyk, R., Wen, V., Culler, D. E., Tygar, J. D.: SPINS: security protocols for sensor networks, MOBICOM, pp. 189-199, 2001   DOI
10 Rivest, R. L., Shamir, A., Adleman, L. M: A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, 21(2): pp. 120-126, 1978   DOI   ScienceOn
11 Diffie, W., Hellman, M. E.: New directions in cryptography, IEEE Trans. Inform. Theory, IT-22, pp. 644-654, November 1976   DOI
12 Parno, B., Perrig, A., and Gligor V.: Distributed Detection of Node Replication Attacks in Sensor Networks, Proceedings of the 2005 IEEE Symposium on Security and Privacy, May 2005   DOI
13 Liu, D., Ning, P.: Establishing Pairwise keys in distributed sensor networks, In Proceedings of 10th ACM Conf. on Computer and Communi-cations Security (CCS'03), pp. 52-61, 2003   DOI
14 McCune, J., Shi, E., Perrig, A., Reiter, M.: Detection of Denial-of-Message Attacks on Sensor Network Broadcasts, In Proceedings of the IEEE Symposium on Security and Privacy, May 2005   DOI
15 Li, J., Janotti, J., DeCouto, D. S. J. , Karger, D. R., Morris, R.: A Scalable Location Service for Geographic Ad Hoc Routing, The Sixth Annual International Conf. on Mobile Computing and Networking, pp. 120-130, August 2000   DOI
16 Du, W., Deng, J., Han, Y. S., and Varshney, P.: A pairwise key pre-distribution scheme for wireless sensor networks, In Proceedings of 10th ACM Conf. on Computer and Communications Security (CCS'03), pp. 42-51, 2003   DOI
17 Eschenauer, L., Gligor, V. D.: A key management scheme for distributed sensor networks, In Proceeding of the $9^{th}$ ACM Conf. on Computer and Communications Security, pp. 41-47, 2002   DOI
18 Huang, D. , Mehta, M., Mehdi, D, Harm, L.: Location-aware Key Management Scheme for Wireless Sensor Networks, Proc. of 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'04), pp. 29-42, October 2004   DOI
19 Camtepe, S. A. Yener, B.: Key Distribution Mechanisms for Wireless Sensor Networks: a Surve,. Rensselaer Polytechnic Institute RPI, Technical Report TR-05-07, (March 23, 2005)