Abstract
The current wireless sensor network designs are largely based on a layered approach. The suboptimality and inflexibility of this paradigm result in poor performance, due to constraints of power, communication, and computational capabilities. Key management plays an important role in wireless sensor networks, because it not only takes charge of securing link-layer communications between nodes, but also has great effects on other protocol layers, e.g. routing and IDS (Intrusion Detection System). However, no existing key management protocols have attached enough importance to cross-layering designs. In this paper, we propose a cross-layering key management scheme, which can provide other protocol layers with a nice trust-level metric. The trust-level metric is generated during the pairwise key establishment phase, and it varies as system conditions change. This metric describes the security level between two neighboring nodes and helps other protocol layers to make decisions. We also present simulations and analysis to show the superior characteristics of our scheme against both passive attacks and active attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Zhou, L., Haas, Z.J.: Securing Adhoc Networks. IEEE Network Magazine 13(6), 24–30 (1999)
Akyildiz, I.F., Kasimoglu, I.H.: Wireless sensor and actor networks: research challenges. Ad hoc networks 2, 351–367 (2004)
Karlof, C., Sastry, N., Wagner, D.: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In: Second ACM Conference on Embedded Networked Sensor Systems, SensSys 2004 (2004)
Akyildiz, I., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks (2002)
Wadaa, A., Olariu, S., Wilson, L., Eltoweissy, M.: Scalable cryptographic key management in wireless sensor networks. In: Proceedings of 24th International Conference on Distributed Computing Systems Workshops, March 23-24, pp. 796–802 (2004)
Jolly, G.,, M.: A low-energy key management protocol for wireless sensor networks. In: Proceedings of Eighth IEEE International Symposium on Computers and Communication, (ISCC 2003), June 30 -July 3, vol. 1, pp. 335–340 (2003)
Wood, A.D., Stankovic, J.A.: Denial of Service in sensor network. IEEE Computer Magazine (October 2002)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proceedings of 2003 Symposium on Security and Privacy, May 11-14, pp. 197–213 (2003)
Eschenauer, L., Gligor, V.: A Key-Management Scheme for Distributed Sensor Networks. In: Proc. of ACM CCS 2002 (2002)
Zhu, S., Xu, S., Setia, S., Jajodia, S.: Establishing Pair-wise Keys For Secure Communication in Ad Hoc Networks: A Probabilistic Approach. In: Proc. of the 11th IEEE International Conference on Network Protocols (ICNP 2003), Atlanta, Georgia, November 4-7 (2003)
Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: The 10th ACM Conference on Computer and Communications Security (CCS 2003), Washington D.C (October 2003)
Du, W., Deng, J., Han, Y.S., Varshney, P.: A Pairwise Key Predistribution Scheme for Wireless Sensor Networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), Washington, DC, October 27-31 (2003)
Du, W., Deng, J., Han, Y.S., Varshney, P.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), Washington DC, October 27-31 (2003)
Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In: Proceedings of the IEEE INFOCOM 2004, Hongkong, March 7-11, pp. 586–597 (2004)
Shamir, A.: How to share a secret. Comm. ACM 22(11), 612–613 (1979)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yu, B., Chen, H., Yang, M., Mao, D., Gao, C. (2005). A Key Management Scheme for Cross-Layering Designs in Wireless Sensor Networks. In: Pan, Y., Chen, D., Guo, M., Cao, J., Dongarra, J. (eds) Parallel and Distributed Processing and Applications. ISPA 2005. Lecture Notes in Computer Science, vol 3758. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11576235_76
Download citation
DOI: https://doi.org/10.1007/11576235_76
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-29769-7
Online ISBN: 978-3-540-32100-2
eBook Packages: Computer ScienceComputer Science (R0)