Improving Identity-based Random Key Establishment Scheme for Large-Scale Hierarchical Wireless Sensor Networks

In this paper, we propose a novel identity-based random key pre-distribution scheme called the identity based key pre-distribution using a pseudo random function (IBPRF), which has better trade-off between communication overhead, network connectivity and resilience against node capture compared to the other existing key predistribution schemes. IBPRF always guarantees that no matter how many sensor nodes are captured, the secret communication between non-compromised sensor nodes are still secure. We then propose an improved version of our scheme in a large-scale hierarchical wireless sensor network. This improved approach has better trade off among network connectivity, security, communication, computational and storage overheads, and scalability than the existing random key pre-distribution schemes. The strength of the proposed IBPRF scheme and its improved approach is establishing pairwise secret keys between neighboring nodes with scantling communication and computational overheads. The improved IBPRF approach further supports a large-scale sensor network for the network connectivity. Through the analysis we show that the improved IBPRF scheme provides better security and lower overheads than other existing schemes.

[1]  Davide Brunelli,et al.  Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.

[2]  Donggang Liu,et al.  Improving key predistribution with deployment knowledge in static sensor networks , 2005, TOSN.

[3]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[4]  Taher El Gamal A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.

[5]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[6]  Douglas R. Stinson,et al.  Two attacks on a sensor network key distribution scheme of Cheng and Agrawal , 2008, J. Math. Cryptol..

[7]  F. B. Hildebrand,et al.  Introduction To Numerical Analysis , 1957 .

[8]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[9]  Donggang Liu,et al.  Group-based key predistribution for wireless sensor networks , 2008, TOSN.

[10]  Ashok Kumar Das An efficient random key distribution scheme for large-scale distributed sensor networks , 2011, Secur. Commun. Networks.

[11]  Adrian Perrig,et al.  On the distribution and revocation of cryptographic keys in sensor networks , 2005, IEEE Transactions on Dependable and Secure Computing.

[12]  Silvio Micali,et al.  How to construct random functions , 1986, JACM.

[13]  Bülent Yener,et al.  Key distribution mechanisms for wireless sensor networks : a survey , 2005 .

[14]  Ashok Kumar Das A Location-Adaptive Key Establishment Scheme for Large-Scale Distributed Wireless Sensor Networks , 2009, J. Comput..

[15]  Ian F. Akyildiz,et al.  Wireless sensor networks , 2007 .

[16]  Ashok Kumar Das,et al.  An effective group-based key establishment scheme for large-scale wireless sensor networks using bivariate polynomials , 2008, 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08).

[17]  J. Stoer,et al.  Introduction to Numerical Analysis , 2002 .

[18]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[19]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[20]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[21]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[22]  Juanru Li,et al.  Exploiting unidirectional links for key establishment protocols in heterogeneous sensor networks , 2008, Comput. Commun..

[23]  William Stallings,et al.  Cryptography and network security , 1998 .

[24]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[25]  John T. Kohl,et al.  The Kerberos Network Authentication Service (V5 , 2004 .

[26]  Ashok Kumar Das,et al.  An Identity Based Key Management Scheme in Wireless Sensor Networks , 2011, ArXiv.

[27]  Mohamed Eltoweissy,et al.  SECK: survivable and efficient clustered keying for wireless sensor networks , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..

[28]  Rabi N. Mahapatra,et al.  Secure Data Collection Scheme in Wireless Sensor Network with Mobile Sink , 2008, 2008 Seventh IEEE International Symposium on Network Computing and Applications.

[29]  Ashok Kumar Das An Identity-ased Random Key Pre-distribution Scheme for Direct Key Establishment to Prevent Attacks in Wireless Sensor Networks , 2008, Int. J. Netw. Secur..

[30]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[31]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[32]  Mohamed Eltoweissy,et al.  Dynamic key management in sensor networks , 2006, IEEE Communications Magazine.

[33]  Yongge Wang,et al.  Robust key establishment in sensor networks , 2004, SGMD.

[34]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[35]  Mohamed F. Younis,et al.  A low-energy key management protocol for wireless sensor networks , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.

[36]  NingPeng,et al.  Improving key predistribution with deployment knowledge in static sensor networks , 2005 .

[37]  Mohamed Eltoweissy,et al.  A study of static versus dynamic keying schemes in sensor networks , 2005, PE-WASUN '05.

[38]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[39]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[40]  Dharma P. Agrawal,et al.  An improved key distribution mechanism for large-scale hierarchical wireless sensor networks , 2007, Ad Hoc Networks.

[41]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[42]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.