ABSTRACT
The majority of security schemes available for sensor networks assume deployment in areas without access to a wired infrastructure. More specifically, nodes in these networks are unable to leverage key distribution centers (KDCs) to assist them with key management. In networks with a heterogeneous mix of nodes, however, it is not unrealistic to assume that some more powerful nodes have at least intermittent contact with a backbone network. For instance, an air-deployed battlefield network may have to operate securely for some time until uplinked friendly forces move through the area. We therefore propose LIGER, a hybrid key management scheme for heterogeneous sensor networks that allows systems to operate in both the presence and absence of a KDC. Specifically, when no KDC is available, nodes communicate securely with each other based upon a probabilistic unbalanced method of key management. The ability to access a KDC allows nodes to probabilistically authenticate neighboring devices with which they are communicating. We also demonstrate that this scheme is robust to the compromise of both low and high capability nodes and that the same keys can be used for both modes of operation. Detailed experiments and simulations are used to show that LIGER is a highly practical solution for the current generation of sensors and the unbalanced approach can significantly reduce network initialization time.
- I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. A survey on sensor networks. IEEE Communications Magazine, August 2002.]]Google ScholarDigital Library
- H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In Proceedings of the IEEE Symposium on Security and Privacy (S&P), 2003.]] Google ScholarDigital Library
- Crossbow. Wireless sensor networks. http://www.xbow.com/Products/Wireless Sensor Networks.htm.]]Google Scholar
- W. Du, J. Deng, S. Han, and P.K. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings from the Conference of the IEEE Communications Society (Infocom), 2004.]]Google Scholar
- L. Eschenauer and V. Gligor. A key management scheme for distributed sensor networks. In Proceedings of the ACM Conference on Computer and Communication Security (CCS), 2002.]] Google ScholarDigital Library
- A. Fox and S. Gribble. Security on the move: indirect authentication using kerberos. In Proceedings of the Conference on Mobile Computing and Networking (MobiCom), 1996.]] Google ScholarDigital Library
- C. Karlof, N. Sastry, and D. Wagner. Tinysec: A link layer security architecture for wireless sensor networks. In Proceedings of the ACM Conference of Embedded Networked Sensor System (SenSys), 2004.]] Google ScholarDigital Library
- J. Kohl and B. Neuman. The Kerberos Network Authentication Service (V5), 1993.]] Google ScholarDigital Library
- D. Liu and P. Ning. Establishing pairwise keys in distributed sensor networks. In Proceedings of the ACM Conference on Computer and Communication Security (CCS), 2003.]] Google ScholarDigital Library
- D. Liu and P. Ning. Location-based pairwise key establishments in static sensor networks. In Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003.]] Google ScholarDigital Library
- S. Madden, M. Franklin, J. Hellerstein, and W. Hong. TinyDB: an acquisitional query processing system for sensor networks. ACM Transactions on Database Systems, 30(1):122--173, 2005.]] Google ScholarDigital Library
- S. Marti, T.J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the Conference on Mobile Computing and Networking (MobiCom), 2000.]] Google ScholarDigital Library
- V. Mhatre, C. Rosenberg, D. Kofman, R. Mazumdar, and N. Shroff. A minimum cost heterogeneous sensor network with a lifetime constraint. IEEE Transactions on Mobile Computing, January 2004.]] Google ScholarDigital Library
- R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Commuinications of the ACM, 21:993--999, 1978.]] Google ScholarDigital Library
- A. Perrig, R. Canetti, D. Tygar, and D. Song. The tesla broadcast authentication protocol. RSA CryptoBytes, 5(2):2--13, 2002.]]Google Scholar
- A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. Spins: Security protocols for sensor networks. ACM Wireless Networking, September 2002.]] Google ScholarDigital Library
- C. Shannon. Communication theory of secrecy systems. Bell System Technical Journal, 28, 1949.]]Google Scholar
- TinyOS. http://www.tinyos.net, 2005.]]Google Scholar
- Patrick Traynor, Heesook Choi, Guohong Cao, Sencun Zhu, and Thomas La Porta. Establishing pair-wise keys in heterogeneous sensor networks. In Proceedings of IEEE INFOCOM, 2006.]]Google ScholarCross Ref
- H. Yang, X. Meng, and S. Lu. Self-organized network layer security in mobile ad hoc networks. In Proceedings of the ACM Workshop on Wireless Security (WiSe), 2002.]] Google ScholarDigital Library
- W. Zhang and G. Cao. Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach. In Proceedings from the Conference of the IEEE Communications Society (Infocom), 2005.]]Google Scholar
- S. Zhu, S. Setia, and S. Jajodia. Leap: Efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of the ACM Conference on Computer and Communication Security (CCS), 2003.]] Google ScholarDigital Library
- S. Zhu, S. Xu, S. Setia, and S. Jajodia. Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach. In Proceedings of the IEEE International Conference on Network Protocols, 2003.]] Google ScholarDigital Library
Index Terms
- LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks
Recommendations
Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks
Many applications that make use of sensor networks require secure communication. Because asymmetric-key solutions are difficult to implement in such a resource-constrained environment, symmetric-key methods coupled with a priori key distribution schemes ...
Scalable and efficient key management for heterogeneous sensor networks
As typical wireless sensor networks (WSNs) have resource limitations, predistribution of secret keys is possibly the most practical approach for secure network communications. In this paper, we propose a key management scheme based on random key ...
Density-varying high-end sensor placement in heterogeneous wireless sensor networks
ICC'09: Proceedings of the 2009 IEEE international conference on CommunicationsTo achieve better performance, we adopt a Heterogeneous Sensor Network (HSN) model. In many applications, the locations of some sensor nodes are controllable. In this paper, first we propose a novel density-varying deployment scheme for high-end sensors ...
Comments