skip to main content
10.1145/1080793.1080798acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

Group-based key pre-distribution in wireless sensor networks

Published:02 September 2005Publication History

ABSTRACT

Many key pre-distribution techniques have been developed recently to establish pairwise keys for wireless sensor networks. To further improve these schemes, researchers have proposed to take advantage of sensors' expected locations to help pre-distributing keying materials. However, it is usually very difficult, and sometimes impossible, to guarantee the knowledge of sensors' expected locations. In order to remove the dependency on expected locations, this paper proposes a practical deployment model, where sensor nodes are deployed in groups, and the nodes in the same group are close to each other after the deployment. Based on this model, the paper develops a novel group-based key pre-distribution framework, which can be combined with any of existing key pre-distribution techniques. A distinguishing property of this framework is that it does not require the knowledge of sensors' expected locations and greatly simplifies the deployment of sensor networks. The analysis also shows that the framework can substantially improve the security as well as the performance of existing key pre-distribution techniques.

References

  1. I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. Wireless sensor networks: A survey. Computer Networks, 38(4):393--422, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. S. Basagni, K. Herrin, D. Bruschi, and E. Rosti. Secure pebblenets. In Proceedings of ACM International Symposium on Mobile ad hoc networking and computing, pages 156--163, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. C. Blundo, A. De Santis, Amir Herzberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly-secure key distribution for dynamic conferences. In Advances in Cryptology -- CRYPTO '92, LNCS 740, pages 471--486, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. D.W. Carman, P.S. Kruus, and B.J.Matt. Constrains and approaches for distributed sensor network security. Technical report, NAI Labs, 2000.Google ScholarGoogle Scholar
  5. H. Chan and A. Perrig. PIKE: Peer intermediaries for key establishment in sensor networks. In Proceedings of IEEE Infocom, March 2005.Google ScholarGoogle Scholar
  6. H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Research in Security and Privacy, pages 197--213, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Deng, R. Han, and S. Mishra. Security support for in-network processing in wireless sensor networks. In 2003 ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN '03), October 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. W. Du, J. Deng, Y. S. Han, S. Chen, and P. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of IEEE INFOCOM'04, March 2004.Google ScholarGoogle Scholar
  9. W. Du, J. Deng, Y. S. Han, and P. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. In Proceedings of 10th ACM Conference on Computer and Communications Security (CCS'03), October 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 41--47, November 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. Gay, P. Levis, R. von Behren, M. Welsh, E. Brewer, and D. Culler. The nesC language: A holistic approach to networked embedded systems. In Proceedings of Programming Language Design and Implementation (PLDI 2003), June 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. Hill, R. Szewczyk, A. Woo, S. Hollar, D.E. Culler, and K. S. J. Pister. System architecture directions for networked sensors. In Architectural Support for Programming Languages and Operating Systems, pages 93--104, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. L. Hu and D. Evans. Secure aggregation for wireless networks. In Workshop on Security and Assurance in Ad Hoc Networks, January 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. D. Huang, M. Mehta, D. Medhi, and L. Harn. Location-aware key management scheme for wireless sensor networks. In Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks (SASN '04), pages 29 -- 42, October 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. Hwang and Y. Kim. Revisiting random key pre-distribution schemes for wireless sensor networks. In Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks (SASN '04), pages 43 -- 52, October 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. In Proceedings of 1st IEEE International Workshop on Sensor Network Protocols and Applications, May 2003.Google ScholarGoogle ScholarCross RefCross Ref
  17. D. Liu and P. Ning. Establishing pairwise keys in distributed sensor networks. In Proceedings of 10th ACM Conference on Computer and Communications Security (CCS'03), pages 52--61, October 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. D. Liu and P. Ning. Location-based pairwise key establishments for static sensor networks. In 2003 ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN '03), pages 72--82, October 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. D. Niculescu and B. Nath. Ad hoc positioning system (APS). In Proceedings of IEEE GLOBECOM '01, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  20. A. Perrig, R. Szewczyk, V. Wen, D. Culler, and D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of Seventh Annual International Conference on Mobile Computing and Networks, July 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. R. D. Pietro, L. V. Mancini, and A. Mei. Random key assignment for secure wireless sensor networks. In 2003 ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN '03), October 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. B. Przydatek, D. Song, and A. Perrig. SIA: Secure information aggregation in sensor networks. In Proceedings of the First ACM Conference on Embedded Networked Sensor Systems (SenSys '03), Nov 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. A. D. Wood and J. A. Stankovic. Denial of service in sensor networks. IEEE Computer, 35(10):54--62, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Z. Yu and Y. Guan. A key pre-distribution scheme using deployment knowledge for wireless sensor networks. In Proceedings of ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), April 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. S. Zhu, S. Setia, and S. Jajodia. LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of 10th ACM Conference on Computer and Communications Security (CCS'03), pages 62--72, October 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Group-based key pre-distribution in wireless sensor networks

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          WiSe '05: Proceedings of the 4th ACM workshop on Wireless security
          September 2005
          116 pages
          ISBN:1595931422
          DOI:10.1145/1080793

          Copyright © 2005 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 2 September 2005

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate10of41submissions,24%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader