Sectorized Location Dependent Key Management

Wireless Sensor Networks (WSNs) have been deployed largely due to recent advances in wireless communication technologies. These sensors may be deployed in adverse or even hostile environments so they should consider security issues in their communications. In this paper we proposed Sectorized Location Dependent Key management (SLDK) based on Anjum’s LDK algorithm in which generation of link securing keys, depends totally on the location of the sensor node. This approach does not require any deployment knowledge of sensor nodes. Also sensor nodes can be added at any time to the network and are capable of establishing secure links with their neighbors. In this paper we improved key resiliency of LDK by Sectorizing surrounding environment. We tried to minimize the number of sub-keys required to save, in order to further improve memory efficiency of this scheme.

[1]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[2]  Mohsen Guizani,et al.  An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.

[3]  Mohamed Eltoweissy,et al.  Dynamic key management in sensor networks , 2006, IEEE Communications Magazine.

[4]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[5]  Farooq Anjum Location dependent key management using random key-predistribution in sensor networks , 2006, WiSe '06.

[6]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[7]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[8]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.

[9]  Radha Poovendran,et al.  SeRLoc: secure range-independent localization for wireless sensor networks , 2004, WiSe '04.

[10]  Mohsen Guizani,et al.  Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.

[11]  Dharma P. Agrawal,et al.  Security in Wireless Ad Hoc Networks , 2005, Handbook of Algorithms for Wireless Networking and Mobile Computing.

[12]  Farooq Anjum,et al.  Security for Wireless Ad Hoc Networks: Anjum/Ad hoc Networks , 2007 .

[13]  Mohamed F. Younis,et al.  Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks , 2006, IEEE Transactions on Parallel and Distributed Systems.

[14]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[15]  Sun Youxian,et al.  The Deployment Algorithms in Wireless Sensor Net Works: A Survey , 2009 .

[16]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.