A location-aware authentication and key management scheme for wireless sensor networks

A wireless sensor network (WSN) is generally deployed in an uncontrolled environment where it can be the target of many security attacks trying to compromise its normal operation. Consequently, providing security for data exchanged in a WSN is one of the main requirements to allow the accomplishment of its mission. This paper, proposes a location-aware key authentication and distribution mechanism to secure WSNs where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, public key authentication is based on the position of the sensor node in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code calculated on the corresponding public key using keys derived from encrypted beacons broadcast by anchor nodes. We show that the proposed public key authentication and distribution scheme is more resilient to node replication attack and generates less communication overhead than currently available location dependent schemes.

[1]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[2]  Myong-Soon Park,et al.  An efficient location-dependent key management scheme for wireless sensor networks , 2010, 2010 Sixth International Conference on Intelligent Sensors, Sensor Networks and Information Processing.

[3]  Gene Tsudik,et al.  New multiparty authentication services and key agreement protocols , 2000, IEEE Journal on Selected Areas in Communications.

[4]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[5]  Farooq Anjum,et al.  Location dependent key management in sensor networks without using deployment knowledge , 2007, 2007 2nd International Conference on Communication Systems Software and Middleware.

[6]  Noureddine Boudriga,et al.  On a Controlled Random Deployment WSN-Based Monitoring System Allowing Fault Detection and Replacement , 2014, Int. J. Distributed Sens. Networks.

[7]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[8]  Walid Abdallah,et al.  An efficient and scalable key management mechanism for Wireless Sensor Networks , 2015, 2015 17th International Conference on Advanced Communication Technology (ICACT).