Browse > Article

A Cluster-based Efficient Key Management Protocol for Wireless Sensor Networks  

Jeong, Yoon-Su (충북대학교 컴퓨터과학과)
Hwang, Yoon-Cheol (충북대학교 컴퓨터과학과)
Lee, Keon-Myung (충북대학교 전기전자컴퓨터공학부)
Lee, Sang-Ho (충북대학교 전기전자컴퓨터공학부)
Abstract
To achieve security in wireless sensor networks(WSN), it is important to be able to encrypt and authenticate messages sent among sensor nodes. Due to resource constraints, many key agreement schemes used in general networks such as Diffie-Hellman and public-key based schemes are not suitable for wireless sensor networks. The current pre-distribution of secret keys uses q-composite random key and it randomly allocates keys. But there exists high probability not to be public-key among sensor nodes and it is not efficient to find public-key because of the problem for time and energy consumption. To remove problems in pre-distribution of secret keys, we propose a new cryptographic key management protocol, which is based on the clustering scheme but does not depend on probabilistic key. The protocol can increase efficiency to manage keys because, before distributing keys in bootstrap, using public-key shared among nodes can remove processes to send or to receive key among sensors. Also, to find outcompromised nodes safely on network, it selves safety problem by applying a function of lightweight attack-detection mechanism.
Keywords
Wireless sensor network; cluster; key management protocol;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Horton, et al., 'Mica: The commerciatlization of microsensor motes,' Sensors Online Magazine, April 2002 http://www.sensorsmag.comiarticles/0402/40/main/shtml
2 D. Carman, P. Kruus, and B. Matt, 'Constraints and approaches for distributed sensor network security,' Tech. Rep. 00-010, NAI Labs, September 2000. http://download.nai.com/produets/media/nai/zip/nailabs-report-00-010-final.zip
3 Network simulator. Available in http://www.isi.edu/nsnam/ns, January 2003
4 C. Park, K. Kurosawa, T. Okamoto, and S. Tsujii, 'On key distrubution and authentication in mobile radio networks,' Advances in Cryptology - euroCrypt'93, pp. 461-465, 1993, INCS Volume 765, Springer-verlag
5 A. Khalili, et al., 'Toward Secure key Distribution in Truly Ad-Hoc Networks,' IEEE SAINT'03, pp. 342-346, Jan. 2003
6 D. Boneh, et al., 'Identity-based Encryption from the Weil Pairing,' CRYPTO 2001, vol. 2139, pp. 213-229, Aug. 2001
7 I. zHOU, ET AL., 'Securing Ad Hoc Networks,' IEEE Network Magazine, 13(6), Nov./Dec. 1999   DOI   ScienceOn
8 L. Venkatraman et al., 'A Novel Authentication Schemes Ad Hoc Networks,' IEEE WCNC' 2000, vol.3, pp. 1268-1273, 2000   DOI
9 Gupta G, Younis M, 'Performance Evaluation of Load-Balanced Clustering in Wireless Sensor Networks' In the proc. of l0th International Conference on Telecommunications (ICT 2003), Tahiti, French Polynesia, Feb. 2003   DOI
10 M. Tatebayashi, N. Matsuzaki, and D. B. Newman, 'Key distribution protocol for digital mobile communication systems,' Advances in CryptologyCRYPTO'89, pp. 324-334, 1989, LNCS Volume 435, Springer-verlag
11 A. Perrig, R: Szewczyk, V. Wen, D. Cullar, and J. D. Tygar, 'Spins: Security protocols 'for sensor networks,' in Proceedings of the 7th Annual ACM/IEEE Internation Conference on Mobile Computing and Networking (MobiCom), Rome, Italy, July 2001, pp. 189-199   DOI
12 S. Zhu, S. Setia, and S. Jajodia, 'A distributed group key managemet protocol for ad hoc networks,' Unpublished manuscript, George Mason University, Dec. 2002
13 H. Chan, A. Perrig, and D. Song, 'Random key predistribution schemes for Sensor networks,' In IEEE Symposium on Research in Security and Privacy, May, 2003, pp. 197-213
14 L. Echenauer and V. D. Gligor, 'A Key-Management scheme for Distributed sensor networks,' In Proceedings of the 9th Computer Communication Security, Nov. 2002, pp. 41-47   DOI
15 S. Basagni, K. Herrin, D. Bruschi, and E. Rosti 'Secure pebblenets,' In Proceedings of the 2001 ACM International Symposium on Mobile ad hoc networking & computing, ACM Press, 2001, pp. 156-163   DOI
16 김복순, 조기환, 이행곤, 박병연, '센서 네트워크에서 랜덤 키 체인을 활용한 단대단 키 협의 방안', 한국통신학회 추계종합 학술발표논문집, 28, 2003. pp. 1-12
17 L. Eschenauer and V. D. Gligor, 'A key-management scheme for distributed sensor networks,' in Proceedings of the 9th ACM conference on Computer and communications security, Washington, DC, USA, November 18-22, 2002, pp. 41-47   DOI
18 T. Dimitriou, I. Krontiris, and F. Nikakis, 'Key establishment in sensor networks with resiliency against node capture and replication,' December 2003. Submitted to 5th ACM Symposium on Mobile Ad Hoc Networking and Computing, (MobiHoc) 2004
19 B. C. Neuman and T. Tso, 'Kerberos: An authentication service for computer networks,' IEEE Communications, vol. 32, no. 9, pp. 33-38, September 1994   DOI   ScienceOn
20 R. L. Rivest, A. Shamir, and L. M. Adleman, 'A method for obtaining digital signatures and public-key cryptosystems,' Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978   DOI   ScienceOn
21 W. Fumy and P. Landrock, 'Principles of key management,' IEEE Journal of Selected Areas in Communications, vol. 11, pp. 785-793, June 1993   DOI   ScienceOn
22 I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, 'A survey on sensor networks,' IEEE Communications Magazine, vol. 40, no. 8, pp. 102-114, August 2002   DOI   ScienceOn
23 J. M. Kahn, R. H. Katz, and K. S. J. Pister, 'Next century challenges: Mobile networking for smart dust,' in Proceedings of the 5th Annual ACM/IEEE Internation Conference on Mobile Computing and Networking (MobiCom), 1999, pp. 483-492   DOI
24 W. Diffie and M. E. Hellman, 'New directions in cryptography,' IEEE Transactions on Information Theory, vol. 22, pp. 644-654, November 1976   DOI
25 W. Heinzelman, A. Chandrakasan, H. Balakrishnan, 'Energy Efficient Communication protocol for Wireless Microsensor Networks,' Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, pp. 3005-3014, Jan. 2000