Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

A Key Management Scheme for Cross-Layering Designs in Wireless Sensor Networks

  • Conference paper
Parallel and Distributed Processing and Applications (ISPA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3758))

  • 809 Accesses

Abstract

The current wireless sensor network designs are largely based on a layered approach. The suboptimality and inflexibility of this paradigm result in poor performance, due to constraints of power, communication, and computational capabilities. Key management plays an important role in wireless sensor networks, because it not only takes charge of securing link-layer communications between nodes, but also has great effects on other protocol layers, e.g. routing and IDS (Intrusion Detection System). However, no existing key management protocols have attached enough importance to cross-layering designs. In this paper, we propose a cross-layering key management scheme, which can provide other protocol layers with a nice trust-level metric. The trust-level metric is generated during the pairwise key establishment phase, and it varies as system conditions change. This metric describes the security level between two neighboring nodes and helps other protocol layers to make decisions. We also present simulations and analysis to show the superior characteristics of our scheme against both passive attacks and active attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Zhou, L., Haas, Z.J.: Securing Adhoc Networks. IEEE Network Magazine 13(6), 24–30 (1999)

    Article  Google Scholar 

  2. Akyildiz, I.F., Kasimoglu, I.H.: Wireless sensor and actor networks: research challenges. Ad hoc networks 2, 351–367 (2004)

    Article  Google Scholar 

  3. Karlof, C., Sastry, N., Wagner, D.: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In: Second ACM Conference on Embedded Networked Sensor Systems, SensSys 2004 (2004)

    Google Scholar 

  4. Akyildiz, I., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks (2002)

    Google Scholar 

  5. Wadaa, A., Olariu, S., Wilson, L., Eltoweissy, M.: Scalable cryptographic key management in wireless sensor networks. In: Proceedings of 24th International Conference on Distributed Computing Systems Workshops, March 23-24, pp. 796–802 (2004)

    Google Scholar 

  6. Jolly, G.,, M.: A low-energy key management protocol for wireless sensor networks. In: Proceedings of Eighth IEEE International Symposium on Computers and Communication, (ISCC 2003), June 30 -July 3, vol. 1, pp. 335–340 (2003)

    Google Scholar 

  7. Wood, A.D., Stankovic, J.A.: Denial of Service in sensor network. IEEE Computer Magazine (October 2002)

    Google Scholar 

  8. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of 2003 Symposium on Security and Privacy, May 11-14, pp. 197–213 (2003)

    Google Scholar 

  9. Eschenauer, L., Gligor, V.: A Key-Management Scheme for Distributed Sensor Networks. In: Proc. of ACM CCS 2002 (2002)

    Google Scholar 

  10. Zhu, S., Xu, S., Setia, S., Jajodia, S.: Establishing Pair-wise Keys For Secure Communication in Ad Hoc Networks: A Probabilistic Approach. In: Proc. of the 11th IEEE International Conference on Network Protocols (ICNP 2003), Atlanta, Georgia, November 4-7 (2003)

    Google Scholar 

  11. Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: The 10th ACM Conference on Computer and Communications Security (CCS 2003), Washington D.C (October 2003)

    Google Scholar 

  12. Du, W., Deng, J., Han, Y.S., Varshney, P.: A Pairwise Key Predistribution Scheme for Wireless Sensor Networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), Washington, DC, October 27-31 (2003)

    Google Scholar 

  13. Du, W., Deng, J., Han, Y.S., Varshney, P.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), Washington DC, October 27-31 (2003)

    Google Scholar 

  14. Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In: Proceedings of the IEEE INFOCOM 2004, Hongkong, March 7-11, pp. 586–597 (2004)

    Google Scholar 

  15. Shamir, A.: How to share a secret. Comm. ACM 22(11), 612–613 (1979)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yu, B., Chen, H., Yang, M., Mao, D., Gao, C. (2005). A Key Management Scheme for Cross-Layering Designs in Wireless Sensor Networks. In: Pan, Y., Chen, D., Guo, M., Cao, J., Dongarra, J. (eds) Parallel and Distributed Processing and Applications. ISPA 2005. Lecture Notes in Computer Science, vol 3758. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11576235_76

Download citation

  • DOI: https://doi.org/10.1007/11576235_76

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29769-7

  • Online ISBN: 978-3-540-32100-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics