Skip to main content
Erschienen in: Wireless Networks 6/2010

01.08.2010

Location dependent key management in sensor networks without using deployment knowledge

verfasst von: Farooq Anjum

Erschienen in: Wireless Networks | Ausgabe 6/2010

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper we propose an approach for key management in sensor networks which takes the location of sensor nodes into consideration while deciding the keys to be deployed on each node. As a result, this approach not only reduces the number of keys that have to be stored on each sensor node but also provides for the containment of node compromise. Thus compromise of a node in a location affects the communications only around that location. This approach which we call as location dependent key management does not require any knowledge about the deployment of sensor nodes. The proposed scheme starts off with loading a single key on each sensor node prior to deployment. The actual keys are then derived from this single key once the sensor nodes are deployed. The proposed scheme allows for additions of sensor nodes to the network at any point in time. We study the proposed scheme using both analysis and simulations and point out the advantages.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
The circle corresponding to the highest power level is not shown.
 
2
We assume reliable communication of messages here.
 
Literatur
1.
Zurück zum Zitat Basagni, S., Herrin, K., Bruschi, D., & Rosti, E. (2001). Secure pebblenet. In Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2001, October 2001. Basagni, S., Herrin, K., Bruschi, D., & Rosti, E. (2001). Secure pebblenet. In Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2001, October 2001.
2.
Zurück zum Zitat Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy, pp. 197–213, May 2003. Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy, pp. 197–213, May 2003.
3.
Zurück zum Zitat Du, W., Deng, J., Han, Y., & Varshney, P. (2003). A pairwise key pre distribution scheme for wireless sensor networks. In Proceedings of the Tenth ACM Conference on Computer and Communications Security (CCS 2003), pp. 42–51, October 2003. Du, W., Deng, J., Han, Y., & Varshney, P. (2003). A pairwise key pre distribution scheme for wireless sensor networks. In Proceedings of the Tenth ACM Conference on Computer and Communications Security (CCS 2003), pp. 42–51, October 2003.
4.
Zurück zum Zitat Du, W., Deng, J., Han, Y. S., Chen, S., & Varshney, P. K. (2004). A key management scheme for wireless sensor networks using deployment knowledge. In INFOCOM, 2004, April 2004. Du, W., Deng, J., Han, Y. S., Chen, S., & Varshney, P. K. (2004). A key management scheme for wireless sensor networks using deployment knowledge. In INFOCOM, 2004, April 2004.
5.
Zurück zum Zitat Du, W., Deng, J., Han, Y. S., Varshney, P., Katz, J., & Khalili, A. (2005). A pairwise key pre-distribution scheme for wireless sensor networks. In ACM Transactions on Information and System Security (TISSEC), 2005. Du, W., Deng, J., Han, Y. S., Varshney, P., Katz, J., & Khalili, A. (2005). A pairwise key pre-distribution scheme for wireless sensor networks. In ACM Transactions on Information and System Security (TISSEC), 2005.
6.
Zurück zum Zitat Eschenauer, L., & Gligor, V. (2002). A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47, November 2002. Eschenauer, L., & Gligor, V. (2002). A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47, November 2002.
7.
Zurück zum Zitat Liu, D., & Ning, P. (2003). Establishing pairwise keys in distributed sensor networks. In Proceedings of the Tenth ACM Conference on Computer and Communications Security (CCS 2003), pp. 52–61, October 2003. Liu, D., & Ning, P. (2003). Establishing pairwise keys in distributed sensor networks. In Proceedings of the Tenth ACM Conference on Computer and Communications Security (CCS 2003), pp. 52–61, October 2003.
8.
Zurück zum Zitat Liu, D., Ning, P., & Li, R. (2005). Establishing pairwise keys in distributed sensor networks. In ACM Transactions in Information Systems Security (Vol. 8, pp. 41–77), October 2005. Liu, D., Ning, P., & Li, R. (2005). Establishing pairwise keys in distributed sensor networks. In ACM Transactions in Information Systems Security (Vol. 8, pp. 41–77), October 2005.
9.
Zurück zum Zitat Perrig, A., Szewczyk, R., Wen, V., Culler, D., & Tygar, J. D. (2002). Spins: Security protocols for sensor networks. In Wireless Networks Journal (WINE), September 2002. Perrig, A., Szewczyk, R., Wen, V., Culler, D., & Tygar, J. D. (2002). Spins: Security protocols for sensor networks. In Wireless Networks Journal (WINE), September 2002.
10.
Zurück zum Zitat Zhu, S., Setia, S., & Jajodia, S. (2003). Leap: Efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS ’03), October 2003. Zhu, S., Setia, S., & Jajodia, S. (2003). Leap: Efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS ’03), October 2003.
11.
Zurück zum Zitat Capkun, S., & Hubaux, J. P. (2005). Secure positioning of wireless devices with application to sensor networks. In IEEE Infocom, March 2005. Capkun, S., & Hubaux, J. P. (2005). Secure positioning of wireless devices with application to sensor networks. In IEEE Infocom, March 2005.
12.
Zurück zum Zitat Lazos, L., & Poovendran, R. (2004). Serloc: Secure range-independent localization for wireless sensor networks. In Proceedings of WISE, pp. 21–30, October 2004. Lazos, L., & Poovendran, R. (2004). Serloc: Secure range-independent localization for wireless sensor networks. In Proceedings of WISE, pp. 21–30, October 2004.
Metadaten
Titel
Location dependent key management in sensor networks without using deployment knowledge
verfasst von
Farooq Anjum
Publikationsdatum
01.08.2010
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 6/2010
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-008-0145-y

Weitere Artikel der Ausgabe 6/2010

Wireless Networks 6/2010 Zur Ausgabe

Neuer Inhalt