SKEW: An efficient Self Key Establishment protocol for Wireless sensor networks

Since wireless sensor networks continue to grow in usage and many sensor-based systems reside in adversarial environments, security consideration is really vital for these systems. But one of the main challenges for the efficient distribution of security keys in wireless sensor networks is the resource scarcity. This paper presents an efficient Self Key Establishment protocol for Wireless sensor networks, nicknamed SKEW, in support of innetwork processing. We show that SKEW manages keys with less storage, communication, key transmission frequency, and computational overheads in comparison with similar protocols for the same purpose. All of these benefits are attained by usage of a very few number of messages for key distribution. Since SKEW preserves the network security even before start up time, it can well serve as a base security protocol for all types of security protocols in wireless sensor networks. In this protocol, none of the sensors in the network can send any packets without encryption. It also uses a key refreshing mechanism that prolongs the network security. Smart dust networks and pervasive computing environments can particularly benefit from the proposed protocol.

[1]  M. Saraogi SECURITY IN WIRELESS SENSOR NETWORKS , 2005 .

[2]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[3]  Arto Salomaa,et al.  Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.

[4]  Silvio Micali,et al.  How to construct random functions , 1986, JACM.

[5]  Bülent Yener,et al.  Key distribution mechanisms for wireless sensor networks : a survey , 2005 .

[6]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[7]  David Hutchison,et al.  A survey of key management for secure group communication , 2003, CSUR.

[8]  Nirupama Bulusu,et al.  Wireless Sensor Networks A Systems Perspective , 2005 .

[9]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[10]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[11]  Shivakant Mishra,et al.  INSENS: Intrusion-Tolerant Routing in Wireless Sensor Networks ; CU-CS-939-02 , 2002 .

[12]  Qiang Huang,et al.  Fast authenticated key establishment protocols for self-organizing sensor networks , 2003, WSNA '03.

[13]  Feng Bao,et al.  Computing of trust in wireless networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[14]  Bruno Dutertre,et al.  Lightweight Key Management in Wireless Sensor Networks by Leveraging Initial Trust , 2004 .

[15]  Yongdae Kim,et al.  Revisiting random key pre-distribution schemes for wireless sensor networks , 2004, SASN '04.

[16]  Sun,et al.  Review of Key Management Mechanisms in Wireless Sensor Networks , 2006 .

[17]  Ingrid Verbauwhede,et al.  Scalable Session Key Construction Protocol for Wireless Sensor Networks , 2002 .

[18]  Anupam Joshi,et al.  Security in Sensor Networks , 2020, Texts in Computer Science.

[19]  Donggang Liu,et al.  Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks , 2002, NDSS.

[20]  Martina Zitterbart,et al.  Security in Sensor Networks , 2010, it Inf. Technol..

[21]  Berk Sunar,et al.  Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.

[22]  Miodrag Potkonjak,et al.  On communication security in wireless ad-hoc sensor networks , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[23]  Wade Trappe,et al.  An authentication framework for hierarchical ad hoc sensor networks , 2003, WiSe '03.

[24]  Gene Tsudik,et al.  Key Agreement in Dynamic Peer Groups , 2000, IEEE Trans. Parallel Distributed Syst..

[25]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[26]  Shivakant Mishra,et al.  Enhancing Base Station Security in Wireless Sensor Networks , 2003 .

[27]  Bülent Yener,et al.  Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, ESORICS.

[28]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[29]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[30]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.