Random sampling key revocation scheme for distributed sensor networks

Distributed key or node revocation facilitates the removal of compromised keys or nodes from a network without requiring a central authority. We propose a new revocation scheme, the random neighbourhood sampling node revocation, for distributed sensor networks. Our protocol is based on simple random sampling, a statistical method to estimate the property of the population through randomly sampling a minimal subset of the population. We exploit one of the inherent features of sensor networks: the sensor nodes are densely deployed, and there is a large overlap of the (wireless) coverage areas of any two neighbouring nodes. The revocation decision is made collectively by the neighbours of a suspicious node. However, instead of collecting the opinions of all neighbours of a suspicious node our scheme samples random subsets of the set of all its neighbours and of the node, which issued the warning. Our protocol is fully decentralized, incurs low communication cost, enables fast reaction to a detected intrusion, is false-detection tolerant and can be implemented with any pairwise key distribution scheme.

[1]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[2]  Ling Liu,et al.  A reputation-based trust model for peer-to-peer ecommerce communities , 2003, EC.

[3]  Ralph C. Merkle,et al.  A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.

[4]  Ion Stoica,et al.  Robust incentive techniques for peer-to-peer networks , 2004, EC '04.

[5]  Jolyon Clulow,et al.  Suicide for the common good: a new strategy for credential revocation in self-organizing systems , 2006, OPSR.

[6]  Yuan Xue,et al.  Maximum supported network coverage area and cost evaluation of key pre-distribution schemes , 2008, PETRA '08.

[7]  Reza Azarderakhsh,et al.  Key Management for Wireless Sensor Networks Using Trusted Neighbors , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[8]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[9]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[10]  Michael Kaminsky,et al.  SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.

[11]  Yuan Xue Key management schemes for distributed sensor networks , 2008 .

[12]  Adrian Perrig,et al.  On the distribution and revocation of cryptographic keys in sensor networks , 2005, IEEE Transactions on Dependable and Secure Computing.

[13]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[14]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[15]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[16]  Peter Kruus,et al.  CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .

[17]  Yong Wang,et al.  KeyRev: An Efficient Key Revocation Scheme for Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.

[18]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[19]  Claude Crépeau,et al.  A certificate revocation scheme for wireless ad hoc networks , 2003, SASN '03.

[20]  Jiejun Kong,et al.  Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.

[21]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[22]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[23]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..