Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Two-Step Hierarchical Protocols for Establishing Session Keys in Wireless Sensor Networks

  • Conference paper
Embedded Software and Systems (ICESS 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3820))

Included in the following conference series:

  • 953 Accesses

Abstract

Secure communication between sensor nodes is required in most of sensor networks, especially those deployed in a hostile environment. Due to the limited energy and computational capability on each sensor node, a public key cryptosystem is not a viable option for a wireless sensor network. Hence, the idea of key pre-distribution has been widely adopted in most of the session key establishment protocols proposed so far. In this paper, 1) several typical session key establishment protocols are analyzed and compared in terms of common criteria, 2) the requirements for improving upon the existing protocols are derived, and 3) two advanced protocols which take a two-step hierarchical approach to satisfying the requirements are proposed. Through the performance analysis, it has been shown that the proposed protocols improve the connectivity of a sensor network, uniqueness of session keys and security over the existing protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Perrig, A., Stankovic, J., Wagner, D.: Security in Wireless Sensor Networks. Communications of the ACM 47(6), 53–57 (2004)

    Article  Google Scholar 

  2. Smith, N.H.R., Bradford, P.: Security for Fixed Sensor Networks. In: Proc. of ACMSE 2004, pp. 212–213 (2004)

    Google Scholar 

  3. Wang, Y.: Robust Key Establishment in Sensor Networks. SIGMOD Record 33(1), 14–19 (2004)

    Article  Google Scholar 

  4. Perrig, A., et al.: SPINS: Security Protocols for Sensor Networks. Journal of Wireless Nets 8(5), 521–534 (2002)

    Article  MATH  Google Scholar 

  5. Lai, B., et al.: Reducing Radio Energy Consumption of Key Management Protocols for Wireless Sensor networks. In: Poc. of ISLPED 2004, pp. 351–356 (2004)

    Google Scholar 

  6. Eschenhaur, L., Gligor, V.: A Key-Management Scheme for Distributed Sensor Networks. In: Proc. of CCS 2002, pp. 41–47 (2002)

    Google Scholar 

  7. Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: Proc. of 2003 IEEE Symposium on Security and Privacy(SP 2003), pp. 197–213 (2003)

    Google Scholar 

  8. Pietro, R., Mancini, L., Mei, A.: Random Key-Assignment for Secure Wireless Sensor Networks. In: Proc. of 1st Workshop Security of Ad Hoc and Sensor Networks, pp. 62–71 (2003)

    Google Scholar 

  9. Liu, D., Ning, P.: Location-based Pairwise Key Establishments for Static Sensor Networks. In: Proc. of 1st Workshop Security of Ad Hoc and Sensor Networks, pp. 72–82 (2003)

    Google Scholar 

  10. Du, W., et al.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In: Proc. of the IEEE INFOCOM 2004, pp. 586–597 (2004)

    Google Scholar 

  11. Okazaki, S., Desai, A., Gentry, C., et al: Securing MIPv6 Binding Updates Using Address Based Keys (ABKs), IETF, draft-okazaki-mobileip-abk-01.txt, Work in progress (October 2002)

    Google Scholar 

  12. Blom, R.: An Optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  13. Du, W., et al.: A Pairwise Key Pre-Distribution Scheme for Wireless. In: Proc. of CCS 2003, pp. 27–31 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cho, K., Lee, SY., Kim, J. (2005). Two-Step Hierarchical Protocols for Establishing Session Keys in Wireless Sensor Networks. In: Yang, L.T., Zhou, X., Zhao, W., Wu, Z., Zhu, Y., Lin, M. (eds) Embedded Software and Systems. ICESS 2005. Lecture Notes in Computer Science, vol 3820. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599555_61

Download citation

  • DOI: https://doi.org/10.1007/11599555_61

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30881-2

  • Online ISBN: 978-3-540-32297-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics