Providing End-to-End Secure Communications in Wireless Sensor Networks

In many Wireless Sensor Networks (WSNs), providing end to end secure communications between sensors and the sink is important for secure network management. While there have been many works devoted to hop by hop secure communications, the issue of end to end secure communications is largely ignored. In this paper, we design an end to end secure communication protocol in randomly deployed WSNs. Specifically, our protocol is based on a methodology called differentiated key pre-distribution. The core idea is to distribute different number of keys to different sensors to enhance the resilience of certain links. This feature is leveraged during routing, where nodes route through those links with higher resilience. Using rigorous theoretical analysis, we derive an expression for the quality of end to end secure communications, and use it to determine optimum protocol parameters. Extensive performance evaluation illustrates that our solutions can provide highly secure communications between sensor nodes and the sink in randomly deployed WSNs. We also provide detailed discussion on a potential attack (i.e. biased node capturing attack) to our solutions, and propose several countermeasures to this attack.

[1]  DongGook Park,et al.  A Forward & Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA , 2009, J. Inform. and Commun. Convergence Engineering.

[2]  Panos K. Chrysanthis,et al.  In-network data acquisition and replication in mobile sensor networks , 2010, Distributed and Parallel Databases.

[3]  A. S. Poornima,et al.  Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks , 2009 .

[4]  Ashok Kumar Das An unconditionally secure key management scheme for large-scale heterogeneous wireless sensor networks , 2009, 2009 First International Communication Systems and Networks and Workshops.

[5]  Yi Qian,et al.  A design of optimal key management scheme for secure and survivable wireless sensor networks , 2008, Secur. Commun. Networks.

[6]  I-En Liao,et al.  A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks , 2011, EURASIP J. Wirel. Commun. Netw..

[7]  Hossam S. Hassanein,et al.  Rate Splitting MIMO-based MAC Protocol , 2007 .

[8]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[9]  Shouhuai Xu,et al.  Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..

[10]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[11]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[12]  Douglas R. Stinson,et al.  Deterministic Key Predistribution Schemes for Distributed Sensor Networks , 2004, Selected Areas in Cryptography.

[13]  Donggang Liu,et al.  Improving key predistribution with deployment knowledge in static sensor networks , 2005, TOSN.

[14]  Myong-Soon Park,et al.  An AVL Tree-Based Dynamic Key Management in Hierarchical Wireless Sensor Network , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[15]  Deborah Estrin,et al.  Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.

[16]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[17]  C. Castelluccia,et al.  Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.

[18]  David Llewellyn-Jones,et al.  Group-based key management for Mobile Sensor Networks , 2010, 2010 IEEE Sarnoff Symposium.

[19]  Yunho Lee,et al.  A New Efficient Key Management Protocol for Wireless Sensor and Actor Networks , 2009, ArXiv.

[20]  Bruno Dutertre,et al.  Lightweight Key Management in Wireless Sensor Networks by Leveraging Initial Trust , 2004 .

[21]  Hangyang Dai,et al.  Triangle-based key management scheme for wireless sensor networks , 2009 .

[22]  J. Spencer The Strange Logic of Random Graphs , 2001 .

[23]  Junghyun Lee,et al.  Energy Efficient Key Management Protocol in Wireless Sensor Networks , 2010 .

[24]  Bin Ma,et al.  Deploying Wireless Sensor Networks under Limited Mobility Constraints , 2007, IEEE Transactions on Mobile Computing.

[25]  Tian He,et al.  SIGF: a family of configurable, secure routing protocols for wireless sensor networks , 2006, SASN '06.

[26]  Robert H. Deng,et al.  Hierarchical Self-healing Key Distribution for Heterogeneous Wireless Sensor Networks , 2009, SecureComm.

[27]  Yong Wang,et al.  An Adaptive Key Management Framework for the Wireless Mesh and Sensor Networks , 2010, Wirel. Sens. Netw..

[28]  Douglas R. Stinson,et al.  A combinatorial approach to key predistribution for distributed sensor networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[29]  Venkatesh Sarangan,et al.  Key management in wireless sensor networks with inter-network sensor roaming , 2008, 2008 33rd IEEE Conference on Local Computer Networks (LCN).

[30]  Yuguang Fang,et al.  Secure localization and authentication in ultra-wideband sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[31]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[32]  Donggang Liu,et al.  Group-based key predistribution for wireless sensor networks , 2008, TOSN.

[33]  Ingrid Verbauwhede,et al.  Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks , 2006, ESAS.

[34]  Wenjing Lou,et al.  LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2008, IEEE Trans. Mob. Comput..

[35]  Thomas G. Robertazzi,et al.  Critical connectivity phenomena in multihop radio models , 1989, IEEE Trans. Commun..

[36]  Mário Serafim Nunes,et al.  Probabilistic Key Management Practical Concerns in Wireless Sensor Networks , 2008, J. Networks.

[37]  Ahmed Helmy,et al.  Poster abstract secure locations: routing on trust and isolating compromised sensors in location-aware sensor networks , 2003, SenSys '03.

[38]  Parameswaran Ramanathan,et al.  Modeling latency—lifetime trade-off for target detection in mobile sensor networks , 2010, TOSN.

[39]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[40]  A. S. Poornima,et al.  Tree-based key management scheme for heterogeneous sensor networks , 2008, 2008 16th IEEE International Conference on Networks.

[41]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[42]  M. Venkatesh,et al.  Sensor Network Traffic-Adaptive Key Management Scheme , 2009, 2009 International Conference on Advances in Recent Technologies in Communication and Computing.

[43]  Tharam S. Dillon,et al.  A Key Management Scheme for Heterogeneous Sensor Networks Using Keyed-Hash Chain , 2009, 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks.

[44]  Peter Langendörfer,et al.  How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.

[45]  Thomas F. La Porta,et al.  Establishing Pair-Wise Keys in Heterogeneous Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[46]  Yuguang Fang,et al.  Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[47]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[48]  Thomas F. La Porta,et al.  Movement-assisted sensor deployment , 2004, IEEE INFOCOM 2004.

[49]  Wenjing Lou,et al.  LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[50]  Brad Karp,et al.  GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.

[51]  Mani Srivastava,et al.  Energy efficient routing in wireless sensor networks , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).

[52]  Young-Koo Lee,et al.  Enhanced Group-Based Key Management Scheme for Wireless Sensor Networks using Deployment Knowledge , 2009, 2009 6th IEEE Consumer Communications and Networking Conference.

[53]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.

[54]  S.A.G. Chandler,et al.  Calculation of number of relay hops required in randomly located radio network , 1989 .

[55]  Peter Kruus,et al.  TinyPK: securing sensor networks with public key technology , 2004, SASN '04.

[56]  Young-Koo Lee,et al.  HGKM: A Group-Based Key Management Scheme for Sensor Networks Using Deployment Knowledge , 2008, 6th Annual Communication Networks and Services Research Conference (cnsr 2008).

[57]  Mark A. Shayman,et al.  Energy Efficient Routing in Wireless Sensor Networks , 2003 .