CAGE: Clique-based Assignment of Group kEy

Due to the unique operational environment of WSNs combined with their communication medium that is open to eavesdroppers, the traditional wireless network threats manifest in new forms. Consequently, key management protocols have become paramount in mitigating the damage caused. Numerous group-key protocols have been proposed in an effort to restrict access to only legitimate users. However, the group-key assignment protocols in literature neither address the issue of the size of a group nor its geographic boundaries. Consequently, in applications like watchdog-based reputation monitoring systems, malicious users are encouraged to pollute the reputation values by bad-mouthing benign nodes. On the otherhand, pairwise- key protocols are very restrictive and impose substantial storage overhead on resource constrained sensors. They do not suit the reputation monitoring systems either, since messages encrypted with pairwise keys cannot be monitored by watchdogs. In this paper, we propose CAGE, a novel, distributed, clique-based group-key assignment protocol, which distinctly addresses the size and geographic restrictions on groups. Our protocol is a simple distributed method, yet effective in securing the neighborhood communication. We prove that CAGE is an optimal solution through simulations and analysis.

[1]  Dawn Xiaodong Song,et al.  ELK, a new protocol for efficient large-group key distribution , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[2]  David Hutchison,et al.  EHBT: An Efficient Protocol for Group Key Management , 2001, Networked Group Communication.

[3]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[4]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[5]  Aldar C.-F. Chan,et al.  Distributed symmetric key management for mobile ad hoc networks , 2004, IEEE INFOCOM 2004.

[6]  Donggang Liu,et al.  Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.

[7]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[8]  Jean-Yves Le Boudec,et al.  Analysis of a reputation system for mobile ad-hoc networks with liars , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).

[9]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[10]  Jean C. Walrand,et al.  Approximating maximal cliques in ad-hoc networks , 2004, 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754).

[11]  Jie Wu,et al.  Reputation and Trust-based Systems for Ad Hoc and Sensor Networks , 2006 .

[12]  Dhiraj K. Pradhan,et al.  A cluster-based approach for routing in dynamic networks , 1997, CCRV.

[13]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[14]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[15]  Rolf Niedermeier,et al.  Data reduction and exact algorithms for clique cover , 2009, JEAL.