Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2010.17C.2.165

Key Establishment Mechanism for Clustered Sensor Networks Through Nodes' Location Estimation  

Doh, In-Shil (이화여자대학교 컴퓨터공학과)
Chae, Ki-Joon (이화여자대학교 컴퓨터공학과)
Abstract
Sensor network can be applied in many areas in our life, and security is very important in applying sensor network. For secure sensor communication, pairwise key establishment between sensor nodes is essential. In this paper, we cluster the network field in hexagonal shapes and preassign three different kinds of key information for each sensor according to its expected location. We adopt overlapped key string pool concept for our clustered network architecture and every node uses the part of sub-strings for setting up pairwise keys with all neighboring nodes in its own cluster and from different clusters according to respective position with small amount of information. Our proposal decreases the memory requirement and increases security level efficiently.
Keywords
Sensor Network; Security; Key Management; Cluster; Key String;
Citations & Related Records
연도 인용수 순위
  • Reference
1 L. Eschenauer and V.D. Gligor, “A key management scheme for distributed sensor networks,” Proc. of the 9th ACM CCS'02, pp.41-47, 2002.   DOI
2 H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” IEEE Symposium on Research in Security and Privacy, pp.197-213, 2003.
3 D. Huang, M. Mehta, D. Medhi, L. Harn, “Location-aware key management scheme for wireless sensor networks,” Proc. of ACM Workshop Security of Ad Hoc and Sensor Networks, 2004.   DOI
4 A. Durresi, V. Bulusu, V. Paruchuri, L. Barolli, “SCON: Secure management of continuity in sensor networks,” Computer Communications 29, 2458-2468, 2006.   DOI   ScienceOn
5 C. Blundo, A. De Santis, Amir Herzberg, S. Kutten, U. Vaccaro, and M. Yung, “Perfectly-secure key distribution for dynamic conferences,” In Advances in Cryptology, CRYPTO'92, LNCS 740, pp.471-486, 1993.
6 W. Du, J. Deng, Y. S. Han, S. Chen, and P. Varshney, “A key management scheme for wireless sensor networks using deployment knowledge,” Proc. of IEEE INFOCOM, 2004.   DOI
7 M. Wen, Y. Zheng, W. Ye, Ke. Chen, W. Qui, “A key management protocol with robust continuity for sensor networks,” Computer Standards & Interfaces 31 642-647, 2009.   DOI   ScienceOn
8 I. Doh, K. Chae, “A key setup mechanism utilizing dual key strings for secure sensor communication,” Proc. of 9th International Conference on Advanced Communication Technology(ICACT), 2007.   DOI
9 Z. Yu and Y. Guan, “A Robust Group-based Key Management Scheme for Wireless Sensor Networks,” IEEE Communications Society, WCNC 2005.
10 B. Lai, D. Hwang, S. Kim, and I. Verbauwhede, “Reducing radio energy consumption of key management protocols for wireless sensor networks,” Proc. of ACM/IEEE International Symposium on Low Power Electronics and Design (ISLPED'04), pp.351-356, 2004.   DOI
11 D. Liu and P. Ning, “Establishing pairwise keys in distributed sensor networks,” Proc. of 10th ACM CCS'03, pp.52-61, 2003.   DOI
12 Seyit A. Camtepe, Bulent Yene, “Key Distribution Mechanism for Wireless Sensor Networks : a Survey,” TR-05-07 Rensselaer Polytechnic Institute, Computer Science Department, March, 2005.
13 S. Zhu, S. Setia, S. Jajodia, “LEAP: efficient security mechanisms for large-scale distributed sensor networks,” Proc. of the 10th ACM Conf. on Computer and Communications Security (CCS'03), pp.62-72, 2003.   DOI
14 D.W. Carman, P.S. Kruus, and B.J.Matt, “Constraints and approaches for distributed sensor network security,” Technical report, NAI Labs, 2000.
15 R. Blom, “An optimal class of symmetric key generation systems. Advances in Cryptology,” Proc. of EUROCRYPT'84, LNCS 209, 1985.
16 W. Du, J. Deng, Y. S. Han, and P. Varshney, “A pairwise key predistribution scheme for wireless sensor networks,” Proc. of 10th ACM CCS'03, 2003.   DOI