Skip to main content
Erschienen in: EURASIP Journal on Wireless Communications and Networking 1/2009

Open Access 01.12.2009 | Research Article

In Situ Key Establishment in Large-Scale Sensor Networks

verfasst von: Yingchang Xiang, Fang Liu, Xiuzhen Cheng, Dechang Chen, David H. C. Du

Erschienen in: EURASIP Journal on Wireless Communications and Networking | Ausgabe 1/2009

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Due to its efficiency, symmetric key cryptography is very attractive in sensor networks. A number of key predistribution schemes have been proposed, but the scalability is often constrained by the unavailability of topology information before deployment and the limited storage budget within sensors. To overcome this problem, three in-situ key establishment schemes, SBK, LKE, and iPAK, have been proposed. These schemes require no preloaded keying information but let sensors compute pairwise keys after deployment. In this paper, we propose an in-situ key establishment framework of which iPAK, SBK, and LKE represent different instantiations. We further compare the performance of these schemes in terms of scalability, connectivity, storage, and resilience. Our simulation results indicate that all the three schemes scale well to large sensor networks. We also notice that SBK outperforms LKE and LKE outperforms iPAK with respect to topology adaptability. Finally, observing that iPAK, SBK, and LKE all rely on the key space models that involve computationally intensive modular operations, we propose an improvement that rely on random keys that can be easily computed from a secure pseudorandom function. This new approach requires no computation overhead at regular worker sensors, therefore has a high potential to conserve the network resource.

1. Introduction

Secure communication is a critical requirement for many sensor network applications. Nevertheless, the constrained capabilities of smart sensors (battery supply, CPU, memory, etc.) and the harsh deployment environment of a sensor network (infrastructureless, wireless, ad hoc, etc.) make this problem very challenging. A secure sensor network requires a "sound" key establishment scheme that should be easily realized by individual sensors, should be localized to scale well to large sensor networks, should require small amount of space for keying information storage, and should be resilient against node capture attacks.
Symmetric key cryptography is attractive and applicable in sensor networks because it is computationally efficient. As reported by Carman et. al [1], a middle-ranged processor such as the Motorola MC68328 "DragonBall" consumes 42 mJ (840 mJ) for RSA encryption (digital signature) and 0.104 mJ for AES when the key size for both cases is 1024 bits. Therefore establishing a shared key for pairwise communication becomes a central problem for sensor network security research. Ever since the pioneer work on key predistribution by Eschenauer and Gligor [2] in the year 2002, a variety of key establishment schemes have been reported, as illustrated in Figure 1.
Key predistribution is motivated by the observation that no topology information is available before deployment. The two extreme cases are the single master key scheme, which preloads a master key to all sensors, and the all pairwise keys scheme, which preloads a unique key for each pair of sensors. The first one is weak in resilience while the second one has a high storage overhead. Other than these two extreme cases there exist a number of probabilistic-based key predistribution schemes [211], which attract most of the research interests in securing sensor networks. The probabilistic-based schemes require each sensor to preload keying information such that two neighboring sensors compute a shared key after exchanging part of the stored information after deployment. Generally speaking, the larger the amount of keying information stored within each sensor, the better the connectivity of the key-sharing graph, the higher the computation and communication overheads. A major drawback of the schemes in this category is the storage space wastage since a large amount of keying information may never be utilized during the lifetime of a sensor. Consequently, the scalability of key predistribution is poor, since the amount of required security information to be preloaded increases with the network size. Furthermore, many of the probabilistic-based approaches bear poor resilience as the compromise of any sensors could release the pairwise key used to protect the communications between two uncompromised sensors. In summary, probabilistic-based key predistribution could not achieve good performance in terms of scalability, storage overhead, key-sharing probability, and resilience simultaneously.
Recently, three in-situ key establishment schemes, iPAK [12], SBK [13] and LKE [14], have been proposed for the purpose of overcoming all the problems faced by key predistribution. Schemes in this category require no keying information to be predistributed, while sensors compute shared keys with their neighbors after deployment. The basic idea is to utilize a small number of service sensors as sacrifices for disseminating keying information to worker sensors in the vicinity. Worker sensors are in charge of normal network operations such as sensing and reporting. Two worker sensors can derive a common key once they obtain keying information from the same service sensor. In this paper, we first propose the in-situ key establishment framework, of which iPAK, SBK, and LKE represent different instantiations. Then we report our comparison study on the performance of these three schemes in terms of scalability, connectivity, storage overhead and resilience. Our results indicate that all the three in-situ schemes scale well to large sensor networks as they require only local information. Furthermore, we also notice that SBK outperforms LKE and LKE outperforms iPAK with respect to topology adaptability. Finally, observing that iPAK, SBK, and LKE all rely on the key space models that involve intensive computation overhead, we propose an improvement that rely on random keys that could be easily generated by a secure pseudorandom function.
This paper is organized as follows. Major key predistribution schemes are summarized in Section 2. Preliminaries, models, and assumptions are sketched in Section 3. The in-situ key establishment framework is introduced in Section 4, and the three instantiations are outlined in Section 5. Performance evaluation and comparison study are reported in Section 6. Finally, we summarize our work and discuss the future research in Section 7.
In this section, major related works on key predistribution are summarized and compared. We refer the readers to [10, 15] for a more comprehensive literature survey.
The basic random keys scheme is proposed by Eschenauer and Gligor in [2], in which a large key pool https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq1_HTML.gif is computed offline and each sensor picks https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq2_HTML.gif keys randomly from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq3_HTML.gif without replacement before deployment. Two sensors can establish a shared key as long as they have at least one key in common. To enhance the security of the basic scheme in against small-scale attacks, Chan et al. [3] propose the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq4_HTML.gif -composite keys scheme in which https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq5_HTML.gif number of common keys are required for two nodes to establish a shared key. This scheme performs worse in resilience when the number of compromised sensors is large.
In these two schemes [2, 3], increasing the number of compromised sensors increases the percentage of compromised links shared by uncompromised sensors. To overcome this problem, in the same work Chan et al. [3] propose to boost up a unique key for each link through multi-path enhancement. For the same purpose, Zhu et al. [16] propose to utilize multiple logic paths. To improve the efficiency of key discovery in [2, 3], which is realized by exchanging the identifiers of the stored keys, or by a challenge-response procedure, Zhu et al. [16] propose an approach based on the pseudo-random key generator seeded by the node id. Each sensor computes the key identifiers and preloads the corresponding keys based on its unique id. Two sensors can determine whether they have a common key based on their ids only. Note that this procedure does not improve the security of the key discovery procedure since an attacker can still Figure out the key identifiers as long as the algorithm is available. Further, a smart attacker can easily beat the pseudo-random key generator to compromise the network faster [17]. Actually for smart attackers, challenge-response is an effective way for key discovery but it is too computationally intensive. Di Pietro et al. [17] propose a pseudo-random key predeployment scheme that supports a key discovery procedure that is as efficient as the pseudo-random key generator [16] and as secure as challenge-response.
To improve the resilience of the random keys scheme in against node capture attacks, random pairwise keys schemes have been proposed [3, 4], in which a key is shared by two sensors only. These schemes have good resilience against node capture attacks since the compromise of a sensor only affects the links incident to that sensor. The difference between [3] and [4] is that sensors in [3] are paired based on ids while in [4] are on virtual grid locations. Similar to the random keys schemes, random pairwise keys schemes do not scale well to large sensor networks. Neither do they have good key-sharing probability due to the conflict between the high keying storage redundancy requirement and the memory constraint.
To improve the scalability of the random keys schemes, two random key spaces schemes [5, 7] have been proposed independently at ACM CCS 2003. These two works are similar in nature, except that they apply different key space models, which will be summarized in Subsection 3.1. Each sensor preloads several keying shares, with each belonging to one key space. Two sensors can establish a shared key if they have keying information from the same key space. References [7] also proposes to assign one key space to each row or each column of a virtual grid. A sensor residing at a grid point receives keying information from exactly two key spaces. This realization involves more number of key spaces. Note that these random key spaces schemes also improve resilience and key-sharing probability because more key spaces are available, and because two sensors compute a unique key within one key space for their shared links.
Compared to the works mentioned above, group-based schemes [6, 8, 9, 11] have the best performance in scalability, key-sharing probability, storage, and resilience due to the relatively less randomness involved in these key predistribution schemes. Du et al. scheme [6] is the first to apply the group concept, in which sensors are grouped before deployment and each group is dropped at one deployment point. Correspondingly, a large key pool https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq6_HTML.gif is divided into subkey spaces, with each associated with one group of sensors. Subkey spaces overlap if the corresponding deployment points are adjacent. Such a scheme ensures that close-by sensors have a higher chance to establish a pairwise key directly. But the strong assumption on the deployment knowledge (static deployment point) renders it impractical for many applications. Also relying on deployment knowledge, the scheme proposed by Yu and Guan in [9] significantly reduces the number of potential groups from which neighbors of each node may come, yet still achieves almost perfect key-sharing probability with low storage overhead. Two similar works [8, 11] have been proposed at ACM Wise 2005 independently. In [8], sensors are equally partitioned based on ids into disjoint deployment groups and disjoint cross groups. Each sensor resides in exactly one deployment group and one cross group. Sensors within the same group can establish shared keys based on any of the key establishment schemes mentioned above [24, 18, 19]. In [11], the deployment groups and cross groups are defined differently and each sensor may reside in more than two groups. Note that these two schemes inherit many nice features of [6], but release the strong topology assumption adopted by [6]. A major drawback of these schemes is the high communication overhead when path keys are sought to establish shared keys between neighboring sensors.
Even with these efforts, the shared key establishment problem still has not been completely solved yet. As claimed by [20, 21], the performance is still constrained by the conflict between the desired probability to construct shared keys for communicating parties and the resilience against node capture attacks, under a given capacity for keying information storage in each sensor. Researchers have been actively working toward this to minimize the randomness [22, 23] in the key predistribution schemes. Due to space limitations, we could not cover all of them thoroughly. Interested readers are referred to a recent survey [15] and the references therein.
Architectures consisting of base stations for key management have been considered in [24] and [25], which rely on base stations to establish and update different types of keys. In [1], Carman et al. apply various key management schemes on different hardware platforms and evaluate their performance in terms of energy consumption, for and so forth. Authentication in sensor networks has been considered in [2426], and so forth.
The three in-situ key establishment schemes [1214] are radically different from all those mentioned above. They rely on service sensors to facilitate pairwise key establishment between worker sensors after deployment. The service sensors could be predetermined [12], or self-elected based on some probability [13] or location information [14]. Each service sensor carries or computes a key space and distributes a unique piece of keying information to each associated worker sensor in its neighborhood via a computationally asymmetric secure channel. Two worker sensors are able to compute a pairwise key if they obtain keying information from the same key space. As verified by our simulation study in Section 6, in-situ schemes can simultaneously achieve good performance in terms of scalability, storage overhead, key-sharing probability, and resilience.

3. Preliminaries, Models, and Assumptions

3.1. Key Space Models

The two key space models for establishing pairwise keys, one is polynomial-based [19] and the other is matrix-based [18], have been tailored for sensor networks at [7] and [5], respectively. These two models are similar in nature.
The polynomial-based key space utilizes a bivariate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq7_HTML.gif -degree polynomial https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq8_HTML.gif over a finite field https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq9_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq10_HTML.gif is a large prime number ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq11_HTML.gif must be large enough to accommodate a cryptographic key). By pluging in the id of a sensor, we obtain the keying information (called a polynomial share) allocated to that sensor. For example, sensor https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq12_HTML.gif receives https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq13_HTML.gif as its keying information. Therefore two sensors knowing each other's id can compute a shared key from their keying information as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq14_HTML.gif . For the generation of a polynomial-based key space https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq15_HTML.gif , we refer the readers to [19].
The matrix-based key space utilizes a https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq16_HTML.gif public matrix (Note that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq17_HTML.gif can contain more than https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq18_HTML.gif columns.) https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq19_HTML.gif and a https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq20_HTML.gif private matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq21_HTML.gif over a finite field https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq22_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq23_HTML.gif is a prime that is large enough to accommodate a cryptographic key. We require https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq24_HTML.gif to be symmetric. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq25_HTML.gif . Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq26_HTML.gif is symmetric, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq27_HTML.gif is symmetric too. If we let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq28_HTML.gif , we have https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq29_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq30_HTML.gif is the element at the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq31_HTML.gif th row and the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq32_HTML.gif th column of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq33_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq34_HTML.gif . Therefore if a sensor knows a row of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq35_HTML.gif , say row https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq36_HTML.gif , and a column of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq37_HTML.gif , say column https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq38_HTML.gif , then the sensor can compute https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq39_HTML.gif . Based on this observation, we can allocate to sensor https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq40_HTML.gif a keying share containing the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq41_HTML.gif th row of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq42_HTML.gif and the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq43_HTML.gif th column of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq44_HTML.gif , such that two sensors https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq45_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq46_HTML.gif can compute their shared key https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq47_HTML.gif by exchanging the columns of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq48_HTML.gif in their keying information. We call https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq49_HTML.gif a matrix-based key space, whose generation has been well-documented by [18] and further by [5].
Both key spaces are https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq50_HTML.gif -collusion-resistent [18, 19]. In other words, as long as no more than https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq51_HTML.gif sensors receiving keying information from the same key space release their stored keying shares to an attacker, the key space remains perfectly secure. Note that it is interesting to observe that the storage space required by a keying share from either key space at a sensor can be very close ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq52_HTML.gif log https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq53_HTML.gif for the polynomial-based key space [19] and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq54_HTML.gif log https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq55_HTML.gif for the matrix-based key space [18]) for the same https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq56_HTML.gif , as long as the public matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq57_HTML.gif is carefully designed. For example, [5] proposes to employ a Vandermonde matrix over https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq58_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq59_HTML.gif , such that a keying share contains one row of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq60_HTML.gif and the seed element of the corresponding column in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq61_HTML.gif . However, the column of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq62_HTML.gif in a keying share must be restored when needed, resulting in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq63_HTML.gif modular multiplications.
Note that iPAK, SBK and LKE work with both key space models. In these schemes, service sensors need to generate or to be preloaded with a key space and then distribute to each worker sensor a keying share. Two worker sensors can establish a shared key as long as they have keying information from the same key space. Note that for a polynomial-based key space, two sensors need to exchange their ids while for a matrix-based key space, they need to exchange the columns (or the seeds of the corresponding columns) of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq64_HTML.gif in their keying shares.

3.2. Rabin's Public Cryptosystem

Rabin's scheme [27] is a public cryptosystem, which is adopted by the in-situ key establishment schemes to set up a computationally asymmetric secure channel through which keying information can be delivered from a service sensor to a worker sensor.

3.2.1. Key Generation

Choose two large distinct primes https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq65_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq66_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq67_HTML.gif . https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq68_HTML.gif is the private key while https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq69_HTML.gif is the public key.

3.2.2. Encryption

For the encryption, only the public key https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq70_HTML.gif is needed. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq71_HTML.gif be the plain text that is represented as an integer in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq72_HTML.gif . Then the cipher text https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq73_HTML.gif .

3.2.3. Decryption

Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq74_HTML.gif , we have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_Equ1_HTML.gif
(1)
By applying the extended Euclidean algorithm, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq75_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq76_HTML.gif can be computed such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq77_HTML.gif .
From the Chinese remainder theorem, four square roots https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq78_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq79_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq80_HTML.gif can be obtained:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_Equ2_HTML.gif
(2)
Note that Rabin's encryption [27] requires only one squaring, which is several hundreds of times faster than RSA. However, its decryption time is comparable to RSA. The security of Rabin's scheme is based on the factorization of large numbers; thus, it is comparable to that of RSA too. Since Rabin's decryption produces three false results in addition to the correct plain text, a prespecified redundancy, a bit string https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq81_HTML.gif , is appended to the plain text before encryption for ambiguity resolution.

3.3. Network Model and Security Assumptions

We consider a large-scale sensor network with nodes dropped over the deployment region through vehicles such as aircrafts. Therefore no topology information is available before deployment. Sensors are classified as either worker nodes or service nodes. Worker sensors are in charge of sensing and reporting data, and thus are expected to operate for a long time. Service sensors take care of key space generation and keying information dissemination to assist in bootstrapping pairwise keys among worker sensors. They may die early due to depleted energy resulted from high workload in the bootstrapping procedure. In this sense, they are sacrifices. Nevertheless, we assume service sensors are able to survive the bootstrapping procedure.
In our consideration, sensors are not tamper resistant. The compromise or capture of a sensor releases all its security information to the attacker. Nevertheless, a sensor deployed in a hostile environment must be designed to survive at least a short interval longer than the key bootstrapping procedure when captured by an adversary; otherwise, the whole network can be easily taken over by the opponent [28].
We further assume that a cryptographically secure key https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq82_HTML.gif is preloaded to all sensors such that all communications in the key establishment procedure can be protected by a popular symmetric cryptosystem such as AES or Triple-DES. Therefore https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq83_HTML.gif is adopted mainly to protect against false sensor injection attacks, and any node deployed by an adversary can be excluded from key establishment. Note that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq84_HTML.gif is strong enough such that it is almost impossible for an adversary to recover it before the key establishment procedure is complete, and the release of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq85_HTML.gif after the key establishment procedure does not negatively affect the security of the in-situ key establishment schemes since all sensitive information involved in the key establishment procedure is protected via a different technique. All sensors should remove their stored keying information ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq86_HTML.gif and/or the key space/pool) at the end of the key bootstrapping procedure.

4. The In-Situ Key Establishment Framework

Compared to the predistribution schemes, in-situ key establishment schemes distribute keying information for shared key computation after deployment.
All the in-situ key establishment contains three phases: service node determination and key space construction, service node association and keying information acquisition, and shared key derivation. iPAK, SBK, and LKE mainly differ from each other in the first phase, which will be detailed afterwards. Now we sketch the framework for in-situ key establishment in sensor networks.

4.1. Service Node Determination and Key Space Construction

In the first phase, service nodes are either preselected (in iPAK[12]), or self-elected with some probability (in SBK[13]) or based on sensors' physical location (in LKE[14]). A https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq87_HTML.gif -collusion resistent key space (either polynomial-based [19] or matrix-based [18]) is allocated to [12] or generated by [13, 14] each service sensor.
Before deployment, each sensor randomly picks up two primes https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq88_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq89_HTML.gif from a pool of large primes without replacement. The prime pool is precomputed by high-performance facilities, which is out of the scope of this paper. Primes https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq90_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq91_HTML.gif will be used to form the private key such that Rabin's public cryptosystem [27] can be applied to establish a secure channel for disseminating keying information in the second phase.

4.2. Service Node Association and Keying Information Acquisition

Once a service sensor finishes the key space construction, it broadcasts a beacon message notifying others of its existence after a random delay. A worker node receiving the beacon will acquire keying information from the service sensor through a secure channel established based on Rabin's cryptosystem between the two nodes. As illustrated in Figure 2, the service node association and keying information acquisition is composed of the following three steps.

4.2.1. Key Space Advertisement

A service node https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq92_HTML.gif announces its existence through beacon broadcasting when its key space is ready. The beacon message should include: (i) a unique key space id, (ii) the public key https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq93_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq94_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq95_HTML.gif is the corresponding private key preloaded before deployment, and (iii) the coverage area of the service sensor, which is determined in LKE by a grid size https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq96_HTML.gif , and specified in iPAK and SBK by a forwarding bound https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq97_HTML.gif , the maximum distance in hop count over which the existence of a key space can be announced. The message will be forwarded to all sensors within https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq98_HTML.gif 's coverage area.

4.2.2. Secure Channel Establishment

Any worker node requesting the keying information from a service node needs to establish a secure channel to the associated service node. Recall that we leverage Rabin's public key cryptosystem [27] for this purpose. After obtaining the public key https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq99_HTML.gif , a worker sensor picks up a random key https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq100_HTML.gif and computes https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq101_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq102_HTML.gif is a predefined bit pattern for ambiguity resolution in Rabin's decryption. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq103_HTML.gif , along with the location information, is transmitted to the corresponding service sensor. After Rabin's decryption, the service sensor obtains https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq104_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq105_HTML.gif will be utilized to protect the keying share transmission from the service sensor to the work sensor.
Note that in this protocol, each worker sensor executes one Rabin's encryption for each service sensor from which an existence announcement is received, whereas the computationally intensive decryption of Rabin's system is performed only at service sensors. This can conserve the energy of worker sensors to extend the operation time of the network. In this aspect, service nodes work as sacrifices to extend the network lifetime.

4.2.3. Keying Information Acquisition

After a shared key https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq106_HTML.gif is established between a worker node and a service node, the service sensor allocates to the node a keying share from its key space. The keying information, encrypted with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq107_HTML.gif based on any popular symmetric encryption algorithm (AES, DES, etc.), is transmitted to the requesting worker node securely. Any two worker nodes receiving keying information from the same service node can derive a shared key for secure data exchange in the future.
After disseminating the keying information to all worker sensors in the coverage area, the service sensor should erase all stored key space information for security enhancement.

4.3. Shared Key Derivation

Two neighboring nodes sharing at least one key space (having obtained keying information from at least one common service sensor) can establish a shared key accordingly. The actual computation procedure is dependent on the underlying key space model. We refer the readers for the details to Subsection 3.1. Note that this procedure involves the exchange of either node ids, if polynomial-based key space model is utilized [19], or columns (seeds) of the public matrix, if matrix-based key space model is utilized [18]. To further improve security, nonces can be introduced to protect against replay attacks.

5. Service Sensor Election for the In-Situ Key Establishment Schemes

All the in-situ key establishment schemes rely on service sensors for keying information dissemination after deployment. As stated before, the major difference among the three schemes lies in how service sensors are selected, which is sketched in this section.

5.1. iPAK

Service node election in iPAK is trivial. They are predetermined by the network owner. iPAK considers a heterogeneous sensor network consisting of two different types of sensors, namely, worker nodes and service nodes. Since the number of service sensors is expected to be much smaller than that of the worker sensors, service sensors are assumed to have much higher capability (computational power, energy, and so forth) in order to complete the key bootstrapping procedure before they run out of energy.
Each service node is preloaded with all the necessary information, including one key space and two large primes. Worker sensors and service sensors are deployed together, with the proportion predetermined by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq108_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq109_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq110_HTML.gif is the number of service nodes (worker nodes). The serving area of a service node is predetermined by the forwarding bound https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq111_HTML.gif , the utmost hop distance from the service node that the keying information can be disseminated.

5.2. SBK

Compared to iPAK, SBK does not differentiate the roles of worker sensors and service sensors before deployment. Instead, sensors determine their roles after deployment by probing the local topology of the network. In SBK, service sensors are elected based on a probability https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq112_HTML.gif , which is initialized as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq113_HTML.gif . Once elected, a service sensor constructs a https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq114_HTML.gif -collusion-resistent key space and serves worker sensors within its coverage area that is determined by the forwarding bound https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq115_HTML.gif . https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq116_HTML.gif is defined according to the expected network density, which should satisfy https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq117_HTML.gif where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq118_HTML.gif is the average number of neighbors within https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq119_HTML.gif hops in the network.
In SBK, the service node election is conducted for several rounds. At the beginning of each round, a non-service sensor that does not have any service node within https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq120_HTML.gif hops decides to become a service node with the probability https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq121_HTML.gif . If a sensor succeeds in the self-election, it sets up a key space, announces its status to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq122_HTML.gif -hop neighbors after a random delay, and then enters the next phase for keying information dissemination. Otherwise, it listens to key space advertisements. Upon receiving any new key space announcements from a service node that is at most https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq123_HTML.gif hops away, the sensor becomes a worker node, erases its primes, and enters the next phase for service sensor association and keying information acquisition. Note that the reception of a service node announcement also suppresses sensors who have self-elected as service nodes but have not broadcasted their decisions to broadcast their status. If no service node within https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq124_HTML.gif hops is detected in the current round, the sensor participates in the next round.
To speed up the key bootstrapping procedure, an enhanced scheme, iSBK, is also proposed in [13], which achieves high connectivity in less time by generating more service sensors. In iSBK, the service sensor election probability https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq125_HTML.gif is initialized as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq126_HTML.gif , and is doubled in each new round until it reaches 1.

5.3. LKE

Similar to SBK, LKE [14] is a self-configuring key establishment scheme. However, the role differentiation is based on location information instead of a probability https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq127_HTML.gif . Right after deployment, each sensor positions itself and computes a virtual grid with the grid size of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq128_HTML.gif . As illustrated in Figure 3, each grid contains a competition area, the disk region within a radius of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq129_HTML.gif from the grid center. At most one service sensor will be selected from the competition area.
An eligible sensor first waits a random delay. If it receives no competition message from others, it announces its decision to be a service sensor. Otherwise, the sensor self-configures as a worker sensor. Note that all the eligible sensors are within https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq132_HTML.gif -distance from the grid center with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq133_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq134_HTML.gif is the nominal transmission range. The setting of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq135_HTML.gif ensures that all eligible sensors within a grid can communicate with each other directly.
Each service sensor will establish a https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq136_HTML.gif -collusion-resistent key space and serve those worker sensors residing in the coverage area, the disk region centered at the grid center with a radius of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq137_HTML.gif . The setting of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq138_HTML.gif satisfies https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq139_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq140_HTML.gif is the deployment area, and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq141_HTML.gif is the total number of nodes to be deployed. Thus, each service node is expected to serve https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq142_HTML.gif nodes in a uniformly distributed network. To improve performance, iLKE is proposed, which adaptively generates service nodes based on a hierarchical virtual grid structure such that each service sensor will serve at most https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq143_HTML.gif worker sensors.

6. Performance Evaluation

In this section, we study the performance of iPAK, SBK, and LKE via simulation. Note that we focus on worker sensors only, as service sensors are sacrifices that will not participate in the long-lasting networking operations. We will evaluate the in-situ key establishment schemes in terms of the following metrics via simulation: Scalability, Resilience, Connectivity, Storage, and Cost. These performance metrics will be defined at which our corresponding simulation results are reported.

6.1. Simulation Settings

We consider a sensor network of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq144_HTML.gif or https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq145_HTML.gif nodes deployed over a field of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq146_HTML.gif by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq147_HTML.gif . The sensors are uniformly distributed in the network, with each node capable of a fixed transmission range of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq148_HTML.gif . All the results are averaged over https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq149_HTML.gif runs.
In SBK and LKE, the two system parameters that affect the performance are the node density and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq150_HTML.gif , the security parameter of the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq151_HTML.gif -collusion-resistant key spaces. In iPAK, two more system parameters to be specified are https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq152_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq153_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq154_HTML.gif determines the fraction of service nodes to be deployed, and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq155_HTML.gif determines the serving area of a service node. In our simulation study, we measure the performance of the three schemes under the same node density and security parameter https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq156_HTML.gif , and conFigure the other parameters ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq157_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq158_HTML.gif ) accordingly for a fair comparison.
In iPAK, the serving area of a service sensor is specified by the preconfigured parameter https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq159_HTML.gif . While in SBK and LKE, a service sensor determines its coverage area according to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq160_HTML.gif and the node density. Specifically, a service sensor serves worker sensors within https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq161_HTML.gif -hop (in SBK) or https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq162_HTML.gif -distance (in LKE), respectively, where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq163_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq164_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq165_HTML.gif is the maximum number satisfying https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq166_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq167_HTML.gif is the average number of neighbors within https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq168_HTML.gif hops in the network, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq169_HTML.gif is the number of sensors in the network, and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq170_HTML.gif is the deployment area. In the simulation, we select https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq171_HTML.gif (for SBK and iPAK) and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq172_HTML.gif (for LKE) that satisfy
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_Equ3_HTML.gif
(3)
Specifically, we consider https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq173_HTML.gif or https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq174_HTML.gif sensors in the network, estimate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq175_HTML.gif , the average number of neighbors within https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq176_HTML.gif -hop using the ER model [12] (see Table 1), decide the forwarding bound https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq177_HTML.gif for a given security parameter https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq178_HTML.gif (see Table 2), and measure the performance accordingly.
Table 1
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq179_HTML.gif , the number of neighbors within https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq180_HTML.gif hops, computed from ER model, used in Tests 1, 2, and 5.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq181_HTML.gif
1
2
3
4
5
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq182_HTML.gif
9
26
55
101
164
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq183_HTML.gif
16
48
106
194
310
Table 2
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq184_HTML.gif , the forwarding bound, used in Tests 1 and 2.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq185_HTML.gif
50
70
90
110
130
150
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq186_HTML.gif
2
3
3
4
4
4
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq187_HTML.gif
2
2
2
3
3
3
Another parameter to be considered in iPAK is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq188_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq189_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq190_HTML.gif is the number of service sensors (worker sensors). iPAK specifies the proportion of the two different sensors before deployment. While in SBK and LKE, service sensors are elected based on probability or location after deployment. In SBK, a service sensor is elected with the probability https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq191_HTML.gif , with the expectation that each service sensor serves only https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq192_HTML.gif worker sensors. Thus, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq193_HTML.gif is expected to be https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq194_HTML.gif in SBK. While in LKE, the network is divided into grids, and one service sensor is elected from each grid. Hence, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq195_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq196_HTML.gif is the grid size which satisfies https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq197_HTML.gif . Therefore, we consider two settings in the simulation: one is to compare iPAK and SBK with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq198_HTML.gif , the other is to compare iPAK and LKE with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq199_HTML.gif .

6.2. Comparison on Scalability, Storage, Connectivity and Cost

Given a series of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq200_HTML.gif values, we first measure the performance of iPAK, SBK and LKE in terms of storage, measured by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq201_HTML.gif , the number of keying information units (polynomial shares [19] or crypto shares [18]) obtained by a worker sensor; connectivity, measured by the key sharing probability https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq202_HTML.gif , the fraction of communication links that are secured by shared keys; and cost, measured by the percentage of service nodes generated [13, 14] or allocated [12] by the in-situ schemes.
We consider a network of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq203_HTML.gif or https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq204_HTML.gif nodes, and employ the ER model to estimate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq205_HTML.gif , the number of nodes within https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq206_HTML.gif hops in the network. The derived https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq207_HTML.gif values are given in Table 1. Then for each given https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq208_HTML.gif , we set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq209_HTML.gif which is the maximal number satisfying https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq210_HTML.gif . The https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq211_HTML.gif values used in iPAK and SBK are reported in Table 2. According to the analysis in Section 6.1, we conduct three experiments: one is to compare SBK and iPAK, with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq212_HTML.gif in iPAK; one is to compare LKE and iPAK, with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq213_HTML.gif in iPAK; one is to compare SBK and LKE under the same https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq214_HTML.gif and node density. The results are presented in Figures 4, 5, and 6, respectively.
As illustrated in Figures 4, and 5, SBK and LKE can reach better connectivity than iPAK. By adjusting the number of service nodes to be generated, SBK and LKE respond actively to different network conditions with a high key sharing probability. However, iPAK has no such self-adjustability due to the predetermined https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq219_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq220_HTML.gif values. Hence, iPAK requires that the system parameters should be carefully planned beforehand for specific network conditions. Nevertheless, iPAK has the least on-site operating complexity, since node role differentiation and key space construction are already finished before deployment.
Note that the performance of iPAK can be improved by choosing the appropriate system parameters. For example, we set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq221_HTML.gif in Test 1 for a fair comparison between iPAK and SBK. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq222_HTML.gif indicates https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq223_HTML.gif , which is just the lower bound for the fraction of service sensors to ensure the desired key-sharing probability under the limitation of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq224_HTML.gif . Thus, the key-sharing probability of iPAK is low in Figure 4. However, by selecting https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq225_HTML.gif in Test 2, iPAK can achieve a much better connectivity with a small increase in the storage overhead. Hence, we can safely claim that iPAK, as well as SBK and LKE, can be configured to reach a high connectivity with a small amount of keying information storage in worker sensors. By using service nodes as sacrifices, all of the three in-situ schemes can avoid the storage space wastage that is existent in all the probabilistic-based key predistribution schemes, since the keying information is only disseminated within the close neighborhood.
As illustrated in Figure 6, we also observe that SBK and LKE behave similarly, while SBK can always burden worker sensors with similar storage overhead while achieving high connectivity, which is attributed to SBK's excellent topology adaptability. In SBK, sensors differentiate their roles as either service nodes or worker nodes after deployment by probing the local connectivity of the network, and then service nodes disseminate the keying information according to the specific network connectivity. But in LKE, a deterministic procedure based on location information is conducted for role differentiation and keying information distribution. Thereafter, we can expect SBK to perform better than LKE in adapting to different network conditions.
To further study the scalability of the in-situ schemes, we select LKE to compare with several probabilistic-based key predistribution schemes. Figure 7 plots the relationship between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq226_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq227_HTML.gif , the number of memory units for keying information storage in a worker node(for a https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq228_HTML.gif -collusion-resistent key space, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq229_HTML.gif is determined by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq230_HTML.gif , the number of keying information units a sensor can obtain in the form of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq231_HTML.gif for the polynomial-based key space [19], and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq232_HTML.gif for the matrix-based key space [18]). We measure LKE's key sharing probability and compare it with that of the basic random key predistribution scheme (EG) [2], the random polynomial-based key space predistribution scheme (LN) [7] and the random matrix-based key space predistribution scheme (DDHV) [5]. The settings in EG and DDHV are the same as those in [6]. In EG, the key pool is of size https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq233_HTML.gif . In DDHV, we set the security parameter https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq234_HTML.gif and the key pool size of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq235_HTML.gif key spaces. For LN and LKE, both are considered in a network with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq236_HTML.gif nodes, with each node storing https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq237_HTML.gif polynomial shares (we select https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq238_HTML.gif since it is a typical value for LKE in uniform network distribution as proved in [14]). The results show that the in-situ scheme can reach a much higher connectivity than the probabilistic-based predistribution schemes given the same amount of storage budget. Since the in-situ key establishment schemes are purely localized, they can completely remove the randomness inherent to the key predistribution schemes and hence achieve a much better scalability.
In summary, all of the three in-situ schemes obtain high scalability in network size. They can reach high connectivity with small amount of storage overhead, while SBK outperforms LKE, LKE outperforms iPAK in terms of topology adaptability.

6.3. Comparison on Resilience

To evaluate the resilience of the in-situ schemes, we consider a smart attack where an adversary compromises all nodes within a disk of radius https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq239_HTML.gif , and measure the resilience with the following metric.

6.3.1. Resilience

Given an attack radius https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq240_HTML.gif , the resilience against node capture attacks is defined to be the fraction of the compromised links incident to at least one compromised sensor among all the compromised links. Note that the metric resilience is in the range https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq241_HTML.gif , where a value closer to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq242_HTML.gif represents a better resilience.
We consider only iPAK and LKE in our simulation study, since in SBK there are at most https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq243_HTML.gif worker nodes within a https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq244_HTML.gif -collusion-resistent key space. Thus, the resilience of SBK remains to be https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq245_HTML.gif no matter how many nodes are captured and no matter what the network topology will be.
In the simulation, we set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq246_HTML.gif in iPAK to compare with LKE. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq247_HTML.gif (see Table 3) is the maximal number that satisfies https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq248_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq249_HTML.gif (see Table 1) is evaluated with the ER model.
Table 3
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq250_HTML.gif , the forwarding bound, used in Test 5.
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq251_HTML.gif
60
120
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq252_HTML.gif
3
4
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq253_HTML.gif
2
3
As illustrated in Figure 8, both iPAK and LKE can effectively prevent the leakage of security information about uncaptured nodes, while iPAK outperforms LKE under the constraint that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq254_HTML.gif . We also observe that iLKE achieves the "perfect" security, which allows an adversary to learn nothing about the uncaptured sensors from those being directly attacked.
In terms of resilience, iPAK, SBK and LKE perform differently since they follow different regulations on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq257_HTML.gif , the number of keying information to be released in a https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq258_HTML.gif -secure key space. SBK requires strictly that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq259_HTML.gif be at most https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq260_HTML.gif , while iPAK has no such provision at all. In Test 4, the regulation https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq261_HTML.gif indicates that each https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq262_HTML.gif -collusion-resistent key space is expected to cover no more than https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq263_HTML.gif worker sensors, which brings about the strong resilience as illustrated in Figure 8. As for LKE, the improved scheme (iLKE) follows the same requirement as in SBK, while the basic scheme has no requirement on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq264_HTML.gif but defines for each key space a coverage region that is expected to contain https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq265_HTML.gif nodes in a uniformly distributed network. Hence, we observe that LKE and iLKE behave similarly in a uniform network distribution, while iLKE remains "perfectly" secure and LKE shows a small fluctuation in resilience. Such a fluctuation is attributed to the topology that is not perfectly uniform in our simulation.
In summary, SBK and iLKE perform the best in maintaining the security of the system. LKE can achieve a strong resilience under uniform network distribution, while iPAK must set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq266_HTML.gif as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq267_HTML.gif to work against node capture attack.

6.4. Discussion on Computation Overhead

From the in-situ key establishment framework, we know that the computation overhead of a worker sensor comes from three sources: encrypting a shared key https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq268_HTML.gif between a service sensor and itself in secure channel establishment, decoding the keying information obtained from the associated service node in keying information acquisition, and calculating the pairwise keys shared with its neighbors in shared key derivation. The first involves one modular squaring, while the second requires a symmetric decryption operation. These operations are repeated for each service sensor with which the worker sensor associated with.
For each neighbor, a work sensor needs to compute a pairwise key if they share a common key space. In general, given the keying information, computing a shared key with one neighbor takes https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq269_HTML.gif modular multiplications for both key space models. Furthermore, if the matrix-based key spaces are used and only a seed, instead of the whole column of the public matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq270_HTML.gif , is included as the keying information, each worker sensor needs https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq271_HTML.gif more modular operations in order to recover the complete matrix share for each key space.
Modular operations are expensive in terms of energy consumption and computation time, which could make our in-situ schemes unapplicable to many practical sensor network settings. Therefore, we propose to utilize the secure pseudorandom functions (PRF) defined by the 802.11i working group and the Wi-Fi Alliance. These PRFs exploit the computationally light-weight HMAC-SHA-1, with each incorporating a different text string as input [29] to generate nonoverlapping key spaces. In our case, the text string can be the ID or the location information of the service node. Therefore in iPAK, each service node is preloaded with a PRF while in LKE and SBK, the elected service nodes run their stored PRFs to generate key spaces containing random keys. Then the service sensor securely deliver a set of pairwise keys to each associated worker sensor, as long as the worker sensor conveys the list of neighbors to the service sensor in the association phase.
Note that we can treat the PRF as another key space model, based on which each service sensor generates a random key pool that will supply pairwise keys to the associated worker sensors. It is obvious that no computation is needed at the worker sensor side. However, this zero computation overhead does not come for free: each worker sensor needs to collect the list of neighbors and send this information to all the associated service sensors. Therefore worker sensors tradeoff computation overhead with communication overhead. Furthermore, the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F427492/MediaObjects/13638_2009_Article_1662_IEq272_HTML.gif -collusion resistent advantage is also lost as the PRF key space does not hold this property.

7. Conclusion

In this paper, we have studied iPAK, SBK and LKE, the three in-situ key establishment schemes proposed recently for large-scale sensor networks. We also introduce a simple improvement by exploiting a secure pseudorandom function to replace the matrix-based or the polynomial key space such that no computation is needed at the worker sensor to further conserve the resources. Our simulation results indicate that all the three in-situ key establishment schemes achieve high scalability in network size since they are purely localized. In addition, SBK and LKE outperform iPAK in terms of topology adaptability, SBK and iLKE have the best resilience against node capture attack, and iPAK has a better operating complexity. Our future research includes a more extensive performance study under different topology conditions and a comparison study with the probabilistic key predistribution schemes.

Acknowledgment

This research is supported in part by the US National Science Foundation under the CAREER Award CNS-0347674 and the Grant CCF-0627322.
Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License ( https://​creativecommons.​org/​licenses/​by/​2.​0 ), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literatur
1.
Zurück zum Zitat Carman DW, Kruss PS, Matt BJ: Constraints and approaches for distributed sensor network security. NAI Labs, Glenwood, Md, USA; September 2000. Carman DW, Kruss PS, Matt BJ: Constraints and approaches for distributed sensor network security. NAI Labs, Glenwood, Md, USA; September 2000.
2.
Zurück zum Zitat Eschenauer L, Gligor VD: A key-management scheme for distributed sensor networks. Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS '02), November 2002, Washington, DC, USA 41-47.CrossRef Eschenauer L, Gligor VD: A key-management scheme for distributed sensor networks. Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS '02), November 2002, Washington, DC, USA 41-47.CrossRef
3.
Zurück zum Zitat Chan H, Perrig A, Song D: Random key predistribution schemes for sensor networks. Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy (S&P '03), May 2003, Berkeley, Calif, USA 197-213. Chan H, Perrig A, Song D: Random key predistribution schemes for sensor networks. Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy (S&P '03), May 2003, Berkeley, Calif, USA 197-213.
4.
Zurück zum Zitat Chan H, Perrig A: PIKE: peer intermediaries for key establishment in sensor networks. Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '05), March 2005, Miami, Fla, USA 524-535. Chan H, Perrig A: PIKE: peer intermediaries for key establishment in sensor networks. Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '05), March 2005, Miami, Fla, USA 524-535.
5.
Zurück zum Zitat Du W, Deng J, Han YS, Varshney PK, Katz J, Khalili A: A pairwise key predistribution scheme for wireless sensor networks. Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), October 2003, Washington, DC, USA 42-51. Du W, Deng J, Han YS, Varshney PK, Katz J, Khalili A: A pairwise key predistribution scheme for wireless sensor networks. Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), October 2003, Washington, DC, USA 42-51.
6.
Zurück zum Zitat Du W, Deng J, Han YS, Chen S, Varshney PK: A key management scheme for wireless sensor networks using deployment knowledge. Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '04), March 2004, Hong Kong 586-597. Du W, Deng J, Han YS, Chen S, Varshney PK: A key management scheme for wireless sensor networks using deployment knowledge. Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '04), March 2004, Hong Kong 586-597.
7.
Zurück zum Zitat Liu D, Ning P: Establishing pairwise keys in distributed sensor networks. Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), October 2003, Washington, DC, USA 52-61. Liu D, Ning P: Establishing pairwise keys in distributed sensor networks. Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), October 2003, Washington, DC, USA 52-61.
8.
Zurück zum Zitat Liu D, Ning P, Du W: Group-based key predistribution for wireless sensor networks. Proceedings of the ACM Workshop on Wireless Security (WiSe '05), September 2005, Cologne, Germany Liu D, Ning P, Du W: Group-based key predistribution for wireless sensor networks. Proceedings of the ACM Workshop on Wireless Security (WiSe '05), September 2005, Cologne, Germany
9.
Zurück zum Zitat Yu Z, Guan Y: A key pre-distribution scheme using deployment knowledge for wireless sensor networks. Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN '05), April 2005, Los Angeles, Calif, USA 261-268. Yu Z, Guan Y: A key pre-distribution scheme using deployment knowledge for wireless sensor networks. Proceedings of the 4th International Symposium on Information Processing in Sensor Networks (IPSN '05), April 2005, Los Angeles, Calif, USA 261-268.
10.
Zurück zum Zitat Yu Z, Wei Y, Guan Y: Key management for wireless sensor networks. In Handbook of Wireless Mesh & Sensor Networking. Edited by: Aggelou G. McGraw-Hill, New York, NY, USA; 2007. Yu Z, Wei Y, Guan Y: Key management for wireless sensor networks. In Handbook of Wireless Mesh & Sensor Networking. Edited by: Aggelou G. McGraw-Hill, New York, NY, USA; 2007.
11.
Zurück zum Zitat Zhou L, Ni J, Ravishankar CV: Efficient key establishment for group-based wireless sensor deployments. Proceedings of the ACM Workshop on Wireless Security (WiSe '05), September 2005, Cologne, Germany 1-10.CrossRef Zhou L, Ni J, Ravishankar CV: Efficient key establishment for group-based wireless sensor deployments. Proceedings of the ACM Workshop on Wireless Security (WiSe '05), September 2005, Cologne, Germany 1-10.CrossRef
12.
Zurück zum Zitat Ma L, Cheng X, Liu F, An F, Rivera J: iPAK: an in-situ pairwise key bootstrapping scheme for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems 2007, 18(8):1174-1184.CrossRef Ma L, Cheng X, Liu F, An F, Rivera J: iPAK: an in-situ pairwise key bootstrapping scheme for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems 2007, 18(8):1174-1184.CrossRef
13.
Zurück zum Zitat Liu F, Cheng X, Ma L, Xing K: SBK: a self-configuring framework for bootstrapping keys in sensor networks. IEEE Transactions on Mobile Computing 2008, 7(7):858-868.CrossRef Liu F, Cheng X, Ma L, Xing K: SBK: a self-configuring framework for bootstrapping keys in sensor networks. IEEE Transactions on Mobile Computing 2008, 7(7):858-868.CrossRef
14.
Zurück zum Zitat Liu F, Cheng X: LKE: a self-configuring scheme for location-aware key establishment in wireless sensor networks. IEEE Transactions on Wireless Communications 2008, 7(1):224-232.CrossRef Liu F, Cheng X: LKE: a self-configuring scheme for location-aware key establishment in wireless sensor networks. IEEE Transactions on Wireless Communications 2008, 7(1):224-232.CrossRef
15.
Zurück zum Zitat Camtepe SA, Yener B: Key distribution mechanisms for wireless sensor networks: a survey. In RPI Technical Report. Computer Science Department, Rensselaer Polytechnic Institute, Troy, NY, USA; March 2005. Camtepe SA, Yener B: Key distribution mechanisms for wireless sensor networks: a survey. In RPI Technical Report. Computer Science Department, Rensselaer Polytechnic Institute, Troy, NY, USA; March 2005.
16.
Zurück zum Zitat Zhu S, Xu S, Setia S, Jajodia S: Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach. Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP '03), November 2003, Atlanta, Ga, USA 326. Zhu S, Xu S, Setia S, Jajodia S: Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach. Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP '03), November 2003, Atlanta, Ga, USA 326.
17.
Zurück zum Zitat Di Pietro R, Mancini LV, Mei A: Efficient and resilient key discovery based on pseudo-random key pre-deployment. Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS '04), April 2004, Santa Fe, NM, USA 217-224. Di Pietro R, Mancini LV, Mei A: Efficient and resilient key discovery based on pseudo-random key pre-deployment. Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS '04), April 2004, Santa Fe, NM, USA 217-224.
18.
Zurück zum Zitat Blom R: An optimal class of symmetric key generation systems. Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT '84), April 1984, Paris, France 335-338. Blom R: An optimal class of symmetric key generation systems. Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques (EUROCRYPT '84), April 1984, Paris, France 335-338.
19.
Zurück zum Zitat Blundo C, Santis AD, Herzberg A, Kutten S, Vaccaroe U, Yung M: Perfectly-secure key distribution for dynamic conferences. Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '92), August 1992, Santa Barbara, Calif, USA, Lecture Notes in Computer Science 740: 471-486.CrossRef Blundo C, Santis AD, Herzberg A, Kutten S, Vaccaroe U, Yung M: Perfectly-secure key distribution for dynamic conferences. Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '92), August 1992, Santa Barbara, Calif, USA, Lecture Notes in Computer Science 740: 471-486.CrossRef
20.
Zurück zum Zitat Du W, Wang R, Ning P: An efficient scheme for authenticating public keys in sensor networks. In Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC '05), May 2005, Urbana-Champaign, Ill, USA. ACM Press; 58-67.CrossRef Du W, Wang R, Ning P: An efficient scheme for authenticating public keys in sensor networks. In Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MOBIHOC '05), May 2005, Urbana-Champaign, Ill, USA. ACM Press; 58-67.CrossRef
21.
Zurück zum Zitat Shi E, Perrig A: Designing secure sensor networks. IEEE Wireless Communications 2004, 11(6):38-43. 10.1109/MWC.2004.1368895CrossRef Shi E, Perrig A: Designing secure sensor networks. IEEE Wireless Communications 2004, 11(6):38-43. 10.1109/MWC.2004.1368895CrossRef
22.
Zurück zum Zitat Liu D, Ning P: Location-based pairwise key establishments for static sensor networks. Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Security of Ad Hoc and Sensor Networks in Association with 10th ACM Conference on Computer and Communications Security, October 2003, Fairfax, Va, USA 72-82. Liu D, Ning P: Location-based pairwise key establishments for static sensor networks. Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Security of Ad Hoc and Sensor Networks in Association with 10th ACM Conference on Computer and Communications Security, October 2003, Fairfax, Va, USA 72-82.
23.
Zurück zum Zitat Huang D, Mehta M, Medhi D, Harn L: Location-aware key management scheme for wireless sensor networks. In Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04), October 2004, Washington, DC, USA. ACM Press; 29-42.CrossRef Huang D, Mehta M, Medhi D, Harn L: Location-aware key management scheme for wireless sensor networks. In Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04), October 2004, Washington, DC, USA. ACM Press; 29-42.CrossRef
24.
Zurück zum Zitat Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD: SPINS: security protocols for sensor networks. Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, (MOBICOM '01), July 2001, Rome, Italy 189-199.CrossRef Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD: SPINS: security protocols for sensor networks. Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, (MOBICOM '01), July 2001, Rome, Italy 189-199.CrossRef
25.
Zurück zum Zitat Zhu S, Setia S, Jajodia S: LEAP: efficient security mechanisms for large-scale distributed sensor networks. Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), October 2003, Washington, DC, USA 62-72. Zhu S, Setia S, Jajodia S: LEAP: efficient security mechanisms for large-scale distributed sensor networks. Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), October 2003, Washington, DC, USA 62-72.
26.
Zurück zum Zitat Watro R, Kong D, Cuti S-F, Gardiner C, Lynn C, Kruus P: TinyPK: securing sensor networks with public key technology. Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04), October 2004, Washington, DC, USA 59-64.CrossRef Watro R, Kong D, Cuti S-F, Gardiner C, Lynn C, Kruus P: TinyPK: securing sensor networks with public key technology. Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04), October 2004, Washington, DC, USA 59-64.CrossRef
27.
Zurück zum Zitat Rabin MO: Digitalized signatures and public-key functions as intractable as factorization. MIT Laboratory for Computer Science, Cambridge, Mass, USA; 1979. Rabin MO: Digitalized signatures and public-key functions as intractable as factorization. MIT Laboratory for Computer Science, Cambridge, Mass, USA; 1979.
28.
Zurück zum Zitat Anderson R, Chan H, Perrig A: Key infection: smart trust for smart dust. Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP '04), October 2004, Berlin, Germany 206-215. Anderson R, Chan H, Perrig A: Key infection: smart trust for smart dust. Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP '04), October 2004, Berlin, Germany 206-215.
29.
Zurück zum Zitat Edney J, Arbaugh WA: Real 802.11 Security: Wi-Fi Protected Access and 802.11i. Addison-Wesley, Reading, Mass, USA; 2004. Edney J, Arbaugh WA: Real 802.11 Security: Wi-Fi Protected Access and 802.11i. Addison-Wesley, Reading, Mass, USA; 2004.
Metadaten
Titel
In Situ Key Establishment in Large-Scale Sensor Networks
verfasst von
Yingchang Xiang
Fang Liu
Xiuzhen Cheng
Dechang Chen
David H. C. Du
Publikationsdatum
01.12.2009
Verlag
Springer International Publishing
DOI
https://doi.org/10.1155/2009/427492

Weitere Artikel der Ausgabe 1/2009

EURASIP Journal on Wireless Communications and Networking 1/2009 Zur Ausgabe