Browse > Article

Security-Enhanced Key Establishment Scheme for Key Infection  

Hwang Young-Sik (Universityof Science & Technology)
Han Seung-Wan (Electronics and Telecommunication Research Institute)
Nam Taek-Yong (Electronics and Telecommunication Research Institute)
Publication Information
Abstract
Traditional security mechanisms do not work well in the sensor network area due to the sensor's resource constraints. Therefore security issues are challenging problems on realization of the sensor network. Among them, the key establishment is one of the most important and challenging security primitives which establish initial associations between two nodes for secure communications. Recently, R. Anderson et al. proposed one of the promising key establishment schemes for commodity sensor network called Key Infection. However, key infection has an intrinsic vulnerability that there are some areas where adversaries can eavesdrop on the transferred key information at initial key establishment time. Therefore, in this paper, we propose a security-enhanced key establishment scheme for key infection by suggesting a mechanism which effectively reduces the vulnerable areas. The proposed security mechanism uses other neighbor nodes' additional key information to establish pair-wise key at the initial key establishment time. By using the additional key information, we can establish security-enhanced key establishment, since the vulnerable area is decreased than the key infection's. We also evaluate our scheme by comparing it with key infection using logical and mathematical analysis.
Keywords
Key Infection;
Citations & Related Records
연도 인용수 순위
  • Reference
1 R. Blom, 'An Optimal Class of Symmetric Key Generation Systems', In EUROCRYPT 84, 1985
2 J. M. Hwang, Y. D. Kim, 'Revisiting Random Key Pre-distribution Schemes for Wireless Sensor Networks', SASN'04, Washington, DC, USA, October, 2004   DOI
3 Y. H. Lee, V. Phadke, A. Deshmukh, and J. W. Lee, 'Key Management in Wireless Sensor Networks', European Workshop on security in Ad-Hoc and Sensor Networks (ESAS 2004), LNCS 3313, Heidelberg, Germany, August 6, 2004
4 W. Diffle, M. E. Hellman, 'New Directions in Cryptography', IEEE Transactions on Information Theory, Vol. IT-22, No. 6, November, 1976   DOI
5 R. Anderson, H. Chan, A. Perrig, 'Key Infection: Smart Trust for Smart Dust', IEEE International Conference on Network Protocols (ICNP 2004), 2004   DOI
6 E. Shi, A. Perrig, 'Designing Secure Sensor Networks. IEEE Wireless Communications', December, 2004   DOI   ScienceOn
7 R. Szewxzyk, E. Osterwell, J. Polastre, M. Hamiltom, A. Mainwaring, and D. Estrin, 'Habitat Monitoring', Communication of the ACM, Vol. 47, No. 6, June, 2004
8 A. Leon-Garcia, Probability and Random Pro-cesses for Electrical Enigneering, 2nd ed. MA: Addison-Wesley Publishing Company, Inc., 1994
9 W. Du, J. Deng, Y. S. Han, and P. K. Varshney, 'A Pairwise Key Pre-Distribution Scheme for wireless sensor networks', In ACM conference on Computer and Communications Security (CCS), 2003   DOI
10 H. Chan, A. Perrig, D. Song, 'Random Key Predistribution Schemes for Sensor Networks', IEEE Symposium on Research and Privacy, 2003
11 L. Eschenauer, V. D. Gligor, 'A Key-Management Scheme for Distributed Sensor Networks', Conference on Computer and Communications Security. Proceedings of the 9th ACM conference on Computer and communications security 2002, USA. 2002   DOI
12 G. Gaubatz, J-P. Kaps, and B. Sunar, 'Public Key Cryptography in Sensor Networks-Revisited', European Workshop on security in Ad-Hoc and Sensor Networks (ESAS 2004), Germany, August 6, 2004