Clique-based group key assignment in Wireless Sensor Networks

Security has become the corner stone of research in Wireless Sensor Networks (WSNs). Watchdog-based-monitoring systems require pairwise-connectivity of group-members to avoid information asymmetry attacks. Existing group-key protocols in literature don't address this requirement. Although, pairwise-key protocols resolve this drawback, they are highly restrictive and impose substantial storage overhead. Additionally, messages encrypted with pairwise-keys render monitoring systems useless. In this paper, we propose CAGE – a novel, distributed, clique-based group-key protocol that strikes an optimal balance between pairwise-key and group-key protocols. We then present E-CAGE, an improvisation of CAGE that mitigates computation-time to achieve the same results as CAGE.

[1]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[2]  Jie Wu,et al.  Distributed Reputation-based Secure Localization in Sensor Networks , 2006 .

[3]  Jie Wu,et al.  Reputation and Trust-based Systems for Ad Hoc and Sensor Networks , 2006 .

[4]  Aldar C.-F. Chan,et al.  Distributed symmetric key management for mobile ad hoc networks , 2004, IEEE INFOCOM 2004.

[5]  Adrian Perrig,et al.  PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[6]  Rolf Niedermeier,et al.  Data reduction and exact algorithms for clique cover , 2009, JEAL.

[7]  Dhiraj K. Pradhan,et al.  A cluster-based approach for routing in dynamic networks , 1997, CCRV.

[8]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[9]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[10]  S. Buchegger,et al.  A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks , 2004 .

[11]  David Hutchison,et al.  EHBT: An Efficient Protocol for Group Key Management , 2001, Networked Group Communication.

[12]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[13]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[14]  Dawn Xiaodong Song,et al.  ELK, a new protocol for efficient large-group key distribution , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[15]  B SrivastavaMani,et al.  Reputation-based framework for high integrity sensor networks , 2008 .

[16]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[17]  Donggang Liu,et al.  Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.

[18]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[19]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[20]  David Hutchison,et al.  A survey of key management for secure group communication , 2003, CSUR.

[21]  Jean-Yves Le Boudec,et al.  Analysis of a reputation system for mobile ad-hoc networks with liars , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).

[22]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[23]  Minglu Li,et al.  CAGE: Clique-based Assignment of Group kEy , 2007, 2007 Second International Conference on Communications and Networking in China.

[24]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[25]  Jean-Yves Le Boudec,et al.  A test-bed for misbehavior detection in mobile ad-hoc networks - how much can watchdogs really do? , 2004, Sixth IEEE Workshop on Mobile Computing Systems and Applications.