Browse > Article
http://dx.doi.org/10.13089/JKIISC.2006.16.2.71

A Key Management Scheme for Commodity Sensor Networks  

Kim Young-Ho (Graduate School of Information Security, Korea University)
Lee Hwa-Seong (Graduate School of Information Security, Korea University)
Lee Dong-Hoon (Graduate School of Information Security, Korea University)
Abstract
To guarantee secure communication in wireless sensor networks, secret keys should be securely established between sensor nodes. Recently, a simple key distribution scheme has been proposed for pair-wise key establishment in sensor networks by Anderson, Chan, and Perrig. They defined a practical attack model for non-critical commodity sensor networks. Unfortunately, the scheme is vulnerable under their attack model. In this paper, we describe the vulnerability in their scheme and propose a modified one. Our scheme is secure under their attack model and the security of our scheme is proved. Furthermore, our scheme does not require additional communication overhead nor additional infrastructure to load potential keys into sensor nodes.
Keywords
Security; Key Management; Wireless Senor Networks;
Citations & Related Records
연도 인용수 순위
  • Reference
1 R. Anderson, H. Chan, and A. Perrig, 'Key Infection : Smart Trust for Smart Dust,' In 12th IEEE International Conference on Network Protocols, pp.206- 215, October 2004
2 H. Chan, A. Perrig, and D. Song, 'Random key predistribution schemes for sensor networks,' In IEEE Symposium on Security and Privacy, pp. 197-213, May 2003
3 H. Chan and A. Perrig, 'Security and Privacy in Sensor Networks,' IEEE Computer, Vol.36, No.10, pp. 103-105, October 2003
4 L. Eschenauer and V. D. Gligor, 'A key-management scheme for distributed sensor networks,' In Proceedings of the 9th ACM conference on Computer and communications security, pp.41-47, November 2002
5 S. Zhu, S. Setia, and S. Jajodia. 'LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks,' CCS'03, Washington, DC, USA. October 27-31, 2003
6 M. Bellare, J. Kilian, and P. Rogaway, 'The security of the cipher block chaining message authentication code,' Journal of Computer and System Sciences, Vol. 61, No. 3, pp. 362-399, December 2000   DOI   ScienceOn
7 R. Blom, 'An optimal class of symmetric key generation systems,' In Proceedings of EUROCRYPT `84, LNCS Vol. 209, pp.335-338, 1985
8 D. W. Carman, P. S. Kruus, and B. J. Matt, 'Constraints and approaches for distributed sensor network security,' NAI Labs Technical Report 00-010, September 2000
9 D. Liu, P. Ning, and R. Li, 'Establishing Pairwise Keys in Distributed Sensor Networks,' ACM Transactions on Information and System Security, pp.41-77, February 2005
10 I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, 'A survey on sensor networks,' IEEE Communications Magazine, Vol. 40, No. 8, pp. 102-114, August 2002
11 C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, 'Perfectly-secure key distribution for dynamic conferences,' In Proceedings of CRYPTO `93, LNCS Vol. 740, pp. 471-486, 1993
12 Zigbee Alliance, 'Security Services Specification Revision 13', ZigBee Alliance Board of Directors, December 14th, 2004
13 A. Perrig, R. Szewczyk, V. Wen, D. Cullar, and J. D. Tygar, 'SPINS: Security protocols for sensor networks,' In Proceedings of the 7th Annual ACM/IEEE Internation Conference on Mobile Computing and Networking, pp.189- 199, July 2001
14 W. Du, J. Deng, Y. S. Han, S. Chen, and P.K. Varshney, 'A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge,' In Proceedings of the IEEE INFOCOM `04, pp. 586-597, March 2004
15 W. Du, J. Deng, Y. S. Han, P.K. Varshney, J. Katz, and A. Khalili, 'A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks,' ACM Transactions on Information and System Security, pp.228-258, August 2005