Abstract
Secure communication between sensor nodes is required in most of sensor networks, especially those deployed in a hostile environment. Due to the limited energy and computational capability on each sensor node, a public key cryptosystem is not a viable option for a wireless sensor network. Hence, the idea of key pre-distribution has been widely adopted in most of the session key establishment protocols proposed so far. In this paper, 1) several typical session key establishment protocols are analyzed and compared in terms of common criteria, 2) the requirements for improving upon the existing protocols are derived, and 3) two advanced protocols which take a two-step hierarchical approach to satisfying the requirements are proposed. Through the performance analysis, it has been shown that the proposed protocols improve the connectivity of a sensor network, uniqueness of session keys and security over the existing protocols.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Perrig, A., Stankovic, J., Wagner, D.: Security in Wireless Sensor Networks. Communications of the ACM 47(6), 53–57 (2004)
Smith, N.H.R., Bradford, P.: Security for Fixed Sensor Networks. In: Proc. of ACMSE 2004, pp. 212–213 (2004)
Wang, Y.: Robust Key Establishment in Sensor Networks. SIGMOD Record 33(1), 14–19 (2004)
Perrig, A., et al.: SPINS: Security Protocols for Sensor Networks. Journal of Wireless Nets 8(5), 521–534 (2002)
Lai, B., et al.: Reducing Radio Energy Consumption of Key Management Protocols for Wireless Sensor networks. In: Poc. of ISLPED 2004, pp. 351–356 (2004)
Eschenhaur, L., Gligor, V.: A Key-Management Scheme for Distributed Sensor Networks. In: Proc. of CCS 2002, pp. 41–47 (2002)
Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: Proc. of 2003 IEEE Symposium on Security and Privacy(SP 2003), pp. 197–213 (2003)
Pietro, R., Mancini, L., Mei, A.: Random Key-Assignment for Secure Wireless Sensor Networks. In: Proc. of 1st Workshop Security of Ad Hoc and Sensor Networks, pp. 62–71 (2003)
Liu, D., Ning, P.: Location-based Pairwise Key Establishments for Static Sensor Networks. In: Proc. of 1st Workshop Security of Ad Hoc and Sensor Networks, pp. 72–82 (2003)
Du, W., et al.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In: Proc. of the IEEE INFOCOM 2004, pp. 586–597 (2004)
Okazaki, S., Desai, A., Gentry, C., et al: Securing MIPv6 Binding Updates Using Address Based Keys (ABKs), IETF, draft-okazaki-mobileip-abk-01.txt, Work in progress (October 2002)
Blom, R.: An Optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)
Du, W., et al.: A Pairwise Key Pre-Distribution Scheme for Wireless. In: Proc. of CCS 2003, pp. 27–31 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cho, K., Lee, SY., Kim, J. (2005). Two-Step Hierarchical Protocols for Establishing Session Keys in Wireless Sensor Networks. In: Yang, L.T., Zhou, X., Zhao, W., Wu, Z., Zhu, Y., Lin, M. (eds) Embedded Software and Systems. ICESS 2005. Lecture Notes in Computer Science, vol 3820. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599555_61
Download citation
DOI: https://doi.org/10.1007/11599555_61
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30881-2
Online ISBN: 978-3-540-32297-9
eBook Packages: Computer ScienceComputer Science (R0)