Browse > Article

A Key Pre-distribution Scheme Using Double Hash Chain for Strong Security Strength of Wireless Sensor Node  

Jeong, Yoon-Su (충북대학교 전자계산학과 네트워크보안 연구실)
Kim, Yong-Tae (한남대학교 멀티미디어공학부)
Park, Gil-Cheol (한남대학교 멀티미디어공학부)
Lee, Sang-Ho (충북대학교 전기전자컴퓨터공학부)
Abstract
Since WSNs encounter attacks, such as jamming or eavesdropping without physical access occurs, security is one of the important requirements for WSNs. The key pre-distribution scheme that was recently researched for advance of security in WSNs distributes the keys and probability with the use of q-composite random key pre-distribution method, but there is a high probability that no key shared between sensor nodes, and it takes a lot of time and energy to find out the shared key. Therefore, it is not suitable for WSNs. In order to enhance stability of a node that plays a role of gateway without depending on probabilistic key, this paper proposesa key pre-distribution scheme combined with random key pre-distribution scheme and double hash chain. Since the proposed scheme can maintain a small storage place and strong security strengths, it is more efficient than the existing schemes with the same security strengths. In addition, since it uses a small size of key generation key set, it can reduce a great deal of storage overhead.
Keywords
Wireless Sensor Networks; Double Hash Chain; Key Pre-distribution; Security Strength;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Doshi and A. Eswaran, 'A Hierarchical Security Architecture for Group Communication in Sensor Network,' Project Report, 2003
2 S. Slijepcevic, M. Potkonjak, V. Tsiatsis, S. Zimbeck and M. B. Srivastava, 'On Communication Security in Wireless Ad-Hoc Sensor Network,' Proc. of WETICE, pp.139-144, 2002
3 H. Chan and A. Perrig, 'PIKE: Peer intermediaries for key establishment in sensor networks,' Proc. of IEEE INFOCOM, 2005
4 L. Eschenhaur and V. Gligor, 'A Key-Management Scheme for Distributed Sensor Networks,' Proc. of CCS'02, pp.41-47, 2002
5 L. B. Oliveira, H. C. Wang, A. A. Loureiro, 'LHA-SP:secure protocols for hierarchical wireless sensor networks,' In 9th IFIP/IEEE International Symposium on Integrated Network Management, pp.31-44, 15-19. May. 2005
6 H. Chan, A. Perrig and D. Song, 'Random Key Predistribution Schemes for Sensor Networks, Proc. of 2003 IEEE Symposium on Security and Privacy(SP'03), pp.197-213, 2003
7 J. D. Richard and S. Mishra, 'Security Support for In-Network Processing in Wireless Sensor Network', Proc. of ACM Workshop on SASN, pp.83-93, 2003
8 Xiao Chen, Jawad Drissi, 'An Efficient Key Management Scheme in Hierarchical Sensor Network,' Mobile Adhoc and Sensor Systems Conference 2005 IEEE International Confercence, pp.6, Nov. 2005
9 H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, 'Security in Mobile Ad Hoc Networks: Challenges and Solutions', IEEE Wireless Communications, Volume 11, Issue 1, pp.38 -47, Feb. 2004
10 M. Horton, et al., 'Mica: The commerciatlization of microsensor motes,' Sensors Online Magazine, April 2002. http://www.sensorsmag.com/articles/0402/40/main/shtml
11 W. Du, J. Deng and J. Katz, 'A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks,' Proc. of CCS'03, pp.27-31, 2003
12 A-S. K. Pathan, H. W. Lee, C. S. Hong, Security in Wireless Sensor Networks: Issues and Challenges, ICACT 2006, Vol.2, pp.1043-1048, Feb, 2006
13 R. Blom, 'An Optimal class of symmetric key generation systems,' Proc. of EUROCRYPT84, Lecture Notes in Computer Science, Springer-Verlag 209, pp.335-338, 1984
14 B. Lai, D. Hwang, S. Kim and I. Verbauwhede, 'Reducing Radio Energy Consumption of Key Management protocols for Wireless Sensor Networks,' Proc. of ISLPED'04, pp.351-356, 2004
15 R. Pietro, L. Mancini and A. Mei, 'Random Key Assignment for Secure Wireless Sensor Networks,' Proc of 1st Workshop Security of Ad Hoc and Sensor Networks, pp.62-71, 2003