Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

A pairwise key predistribution scheme for wireless sensor networks

Published: 01 May 2005 Publication History

Abstract

To achieve security in wireless sensor networks, it is important to be able to encrypt and authenticate messages sent between sensor nodes. Before doing so, keys for performing encryption and authentication must be agreed upon by the communicating parties. Due to resource constraints, however, achieving key agreement in wireless sensor networks is nontrivial. Many key agreement schemes used in general networks, such as Diffie-Hellman and other public-key based schemes, are not suitable for wireless sensor networks due to the limited computational abilities of the sensor nodes. Predistribution of secret keys for all pairs of nodes is not viable due to the large amount of memory this requires when the network size is large.In this paper, we provide a framework in which to study the security of key predistribution schemes, propose a new key predistribution scheme which substantially improves the resilience of the network compared to previous schemes, and give an in-depth analysis of our scheme in terms of network resilience and associated overhead. Our scheme exhibits a nice threshold property: when the number of compromised nodes is less than the threshold, the probability that communications between any additional nodes are compromised is close to zero. This desirable property lowers the initial payoff of smaller-scale network breaches to an adversary, and makes it necessary for the adversary to attack a large fraction of the network before it can achieve any significant gain.

References

[1]
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., and Cayirci, E. 2002. A survey on sensor networks. IEEE Communications Magazine 40, 8 (Aug.), 102--114.
[2]
Anderson, R. and Kuhn, M. 1996. Tamper resistance---A cautionary note. In Proceedings of the 2nd Usenix Workshop on Electronic Commerce. 1--11.
[3]
Bellare, M., Kilian, J., and Rogaway, P. 2000. The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences 61, 3, 362--399.
[4]
Bellare, M. and Rogaway, P. 1993. Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of the 1st ACM Conference on Computer and Communications Security. 62--73.
[5]
Blom, R. 1985. An optimal class of symmetric key generation systems. In Advances in Cryptology: Proceedings of EUROCRYPT 84, T. Beth, N. Cot, and I. Ingemarsson, Eds. Lecture Notes in Computer Science, vol. 209, Springer-Verlag, Berlin, 335--338.
[6]
Blundo, C., Santis, A. D., Herzberg, A., Kutten, S., Vaccaro, U., and Yung, M. 1993. Perfectly-secure key distribution for dynamic conferences. In Lecture Notes in Computer Science, vol. 740, 471--486.
[7]
Chan, H., Perrig, A., and Song, D. 2003. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy, Berkeley, CA. 197--213.
[8]
Crossbow Technology, Inc. Available at http://www.xbow.com/.
[9]
Du, W., Deng, J., Han, Y. S., and Varshney, P. 2003. A pairwise key predistribution scheme for wireless sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security. 42--51.
[10]
Erdös and Rényi. 1959. On random graphs I. Publ. Math. Debrecen 6, 290--297.
[11]
Eschenauer, L. and Gligor, V. D. 2002. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security. 41--47.
[12]
Kahn, J., Katz, R., and Pister, K. 1999. Next century challenges: Mobile networking for smart dust. In Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom). 483--492.
[13]
Liu, D. and Ning, P. 2003. Establishing pairwise keys in distributed sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security. 52--61.
[14]
MacWilliams, F. and Sloane, N. 1977. The Theory of Error-Correcting Codes. Elsevier Science, New York.
[15]
Malkhi, D., Reiter, M., Wool, A., and Wright, R. N. 2001. Probabilistic quorum systems. Information and Computation 170, 2, 184--206.
[16]
Neuman, B. C. and Tso, T. 1994. Kerberos: An authentication service for computer networks. IEEE Communications 32, 9 (Sept.), 33--38.
[17]
Perrig, A., Szewczyk, R., Wen, V., Cullar, D., and Tygar, J. 2001. SPINS: Security protocols for sensor networks. In Proceedings of the 7th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom). 189--199.
[18]
Peterson, W. W. 1972. Error-Correcting Codes, 2nd ed. MIT Press, Cambridge, MA.

Cited By

View all
  • (2024)Enhancing Security in Social Networks through Machine Learning: Detecting and Mitigating Sybil Attacks with SybilSocNetAlgorithms10.3390/a1710044217:10(442)Online publication date: 3-Oct-2024
  • (2024)Navigating Zero-Knowledge Authentication in the IoT Landscape: A Comprehensive Survey2024 11th International Conference on Computing for Sustainable Global Development (INDIACom)10.23919/INDIACom61295.2024.10498485(791-795)Online publication date: 28-Feb-2024
  • (2024)TurboBlom: A light and resilient key predistribution scheme with application to Internet of ThingsPLOS ONE10.1371/journal.pone.029519019:3(e0295190)Online publication date: 20-Mar-2024
  • Show More Cited By

Index Terms

  1. A pairwise key predistribution scheme for wireless sensor networks

      Recommendations

      Reviews

      Tanveer Zia

      Wireless sensor networks are an emerging technology. Due to their resource-starved nature, they need unique key management techniques to establish secure communication between sensor nodes. The authors propose a security framework in which they analyze various existing key predistribution techniques, and present a new flexible and scalable pairwise key predistribution scheme. Their key predistribution scheme is combined with the scheme presented by Blom [1]. Blom's key predistribution method was not for a sensor network; however, it allowed any pair of nodes in a network to be able to find a pairwise secret key. As long as no more than X nodes are compromised, the network is perfectly secure (this is called the X-secure property). In this key scheme, the authors take a concept from graph theory, and draw an edge between two nodes, if and only if they can find a secret key between themselves. Their hypothesis is that by requiring the graph to be connected, each sensor node needs to carry less key information. During the key predistribution phase, key information is assigned to each node, such that after deployment, neighboring sensor nodes can find a secret key between them. The authors' key predistribution phase generates G and D matrices, followed by the selection of a key space. Then, in the key agreement phase, after deployment, each node discovers whether it shares any key space with its neighbors. To achieve this, each node broadcasts a message containing the node's ID, the indices of key spaces it carries, and the seed of the column of G it carries. Simulation results produced by the authors show the advantage of their scheme over existing key schemes. They prove that in existing schemes, the adversary only needs to compromise less than 100 nodes in order to compromise ten percent of the rest of the secure links, whereas in this scheme, the adversary needs to compromise 500 nodes, thus lowering the payoff to the adversary of smaller scale network breaches. They also show that network resilience can be improved by using multihop neighbors. This paper is worth reading for researchers and professionals working in wireless sensor network security. Online Computing Reviews Service

      Access critical reviews of Computing literature here

      Become a reviewer for Computing Reviews.

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Information and System Security
      ACM Transactions on Information and System Security  Volume 8, Issue 2
      May 2005
      106 pages
      ISSN:1094-9224
      EISSN:1557-7406
      DOI:10.1145/1065545
      Issue’s Table of Contents

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 01 May 2005
      Published in TISSEC Volume 8, Issue 2

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Wireless sensor networks
      2. key predistribution
      3. security

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)49
      • Downloads (Last 6 weeks)3
      Reflects downloads up to 06 Oct 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Enhancing Security in Social Networks through Machine Learning: Detecting and Mitigating Sybil Attacks with SybilSocNetAlgorithms10.3390/a1710044217:10(442)Online publication date: 3-Oct-2024
      • (2024)Navigating Zero-Knowledge Authentication in the IoT Landscape: A Comprehensive Survey2024 11th International Conference on Computing for Sustainable Global Development (INDIACom)10.23919/INDIACom61295.2024.10498485(791-795)Online publication date: 28-Feb-2024
      • (2024)TurboBlom: A light and resilient key predistribution scheme with application to Internet of ThingsPLOS ONE10.1371/journal.pone.029519019:3(e0295190)Online publication date: 20-Mar-2024
      • (2024)MIMOCrypt: Multi-User Privacy-Preserving Wi-Fi Sensing via MIMO Encryption2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00025(2812-2830)Online publication date: 19-May-2024
      • (2024)Educational Desktop for Remote Modeling of Secure Cyber-Physical Systems Protocols2024 7th International Conference on Information Technologies in Engineering Education (Inforino)10.1109/Inforino60363.2024.10551942(1-6)Online publication date: 16-Apr-2024
      • (2024)A survey on security and cryptographic perspective of Industrial-Internet-of-ThingsInternet of Things10.1016/j.iot.2023.10103725(101037)Online publication date: Apr-2024
      • (2024)SEE2PK: Secure and energy efficient protocol based on pairwise key for hierarchical wireless sensor networkPeer-to-Peer Networking and Applications10.1007/s12083-023-01587-617:2(701-721)Online publication date: 17-Jan-2024
      • (2024)A Review of Authentication Schemes in Internet of ThingsMachine Learning, Image Processing, Network Security and Data Sciences10.1007/978-3-031-62217-5_26(309-322)Online publication date: 11-Jun-2024
      • (2023)A Survey of Cryptography and Key Management Schemes for Wireless Sensor NetworksWireless Sensor Networks - Design, Applications and Challenges10.5772/intechopen.112277Online publication date: 18-Oct-2023
      • (2023)Implementation of Elliptic Curves in the Polynomial Blom Key Pre-Distribution Scheme for Wireless Sensor Networks and Distributed Ledger TechnologyJournal of Sensor and Actuator Networks10.3390/jsan1201001512:1(15)Online publication date: 9-Feb-2023
      • Show More Cited By

      View Options

      Get Access

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media