A novel key pre-distribution approach for high security and efficiency using LU-decomposition of matrix

Wide-spread deployment of wireless sensor network WSN is emerging, which allows an economical solution for numerous applications. For the security of communication network, asymmetric cryptography is usually employed. This approach is, however, often unsuitable to WSN due to limited computational and energy power. Among various approaches the random key pre-distribution approach is regarded as the most effective one for WSN. Here one shortcoming is that a common key is not guaranteed to be found between any two communicating nodes. This paper proposes a new key pre-distribution scheme solving this problem by obtaining the keys with LU-decomposition of a symmetric matrix. Mathematical analysis and computer simulation reveal that the proposed scheme significantly reduces the overhead required for secure connectivity and energy efficiency of the sensor nodes compared to the existing approaches. The superiority of the proposed scheme becomes more substantial when the memory size of the sensor nodes is small.

[1]  Song Guo A Compromise-Resilient Pair-wise Rekeying Protocol in Large-Scale Wireless Sensor Networks , 2010 .

[2]  Subhamoy Maitra,et al.  A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design , 2005, ISC.

[3]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[4]  Bülent Yener,et al.  Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, ESORICS.

[5]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[6]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[7]  Huagang Xiong,et al.  An Efficient Key Management Scheme for Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.

[8]  Radha Sankararajan,et al.  Improved Key Predistribution Scheme in Wireless Sensor Networks Using Cell Splitting in Hexagonal Grid Based Deployment Model , 2009, Int. J. Distributed Sens. Networks.

[9]  Paulo S. L. M. Barreto,et al.  A survey on key management mechanisms for distributed Wireless Sensor Networks , 2010, Comput. Networks.

[10]  Jianfeng Ma,et al.  Asymmetric Key Pre-distribution Scheme for sensor networks , 2009, IEEE Trans. Wirel. Commun..

[11]  Honggang Wang,et al.  Scaling Laws of Key Predistribution Protocols in Wireless Sensor Networks , 2011, IEEE Transactions on Information Forensics and Security.

[12]  Sarbari Mitra,et al.  A Hierarchical Deterministic Key Pre-distribution for WSN Using Projective Planes , 2011, ADHOCNETS.

[13]  Mohsen Guizani,et al.  An Efficient Signal-Range-Based Probabilistic Key Predistribution Scheme in a Wireless Sensor Network , 2009, IEEE Transactions on Vehicular Technology.

[14]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[15]  Saber Banihashemian,et al.  A new key management scheme in heterogeneous wireless sensor networks , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).

[16]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[17]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[18]  Adrian Perrig,et al.  PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[19]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[20]  Naixue Xiong,et al.  An energy-efficient scheme in next-generation sensor networks , 2010 .

[21]  Heribert Baldus,et al.  A Deterministic Pairwise Key Pre-distribution Scheme for Mobile Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[22]  Douglas R. Stinson,et al.  On the Construction of Practical Key Predistribution Schemes for Distributed Sensor Networks Using Combinatorial Designs , 2008, TSEC.

[23]  Yacine Challal,et al.  A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks , 2013, IEEE Transactions on Wireless Communications.

[24]  Ingrid Verbauwhede,et al.  Scalable Session Key Construction Protocol for Wireless Sensor Networks , 2002 .

[25]  Azzedine Boukerche,et al.  Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..

[26]  Hsiao-Hwa Chen,et al.  Selecting key management schemes for WSN applications , 2012, Comput. Secur..

[27]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[28]  Yue Qi,et al.  An Efficient and Secure Key Management Scheme for Hierarchical Wireless Sensor Networks , 2012 .

[29]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[30]  Pardeep Kumar,et al.  An efficient key pre-distribution scheme for wireless sensor network using public key cryptography , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.

[31]  J. Spencer The Strange Logic of Random Graphs , 2001 .

[32]  Farooq Anjum,et al.  Location dependent key management in sensor networks without using deployment knowledge , 2007, 2007 2nd International Conference on Communication Systems Software and Middleware.

[33]  Hee Yong Youn,et al.  An Energy-Efficient MAC Protocol Employing Dynamic Threshold for Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.

[34]  Hee Yong Youn,et al.  Tree-Based Clustering(TBC) for Energy Efficient Wireless Sensor Networks , 2010, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops.

[35]  Hermann de Meer,et al.  Dynamic key management in wireless sensor networks: A survey , 2013, J. Netw. Comput. Appl..

[36]  Jim Hefferon,et al.  Linear Algebra , 2012 .

[37]  Shuhua Wang,et al.  K ey pre-distribution using combinatorial designs for wireless sensor networks , 2013 .

[38]  David Joyner,et al.  Linear Algebra with Applications , 1998 .

[39]  Piotr Szczechowiak,et al.  Practical Identity-Based Key Agreement For Secure Communication in Sensor Networks , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.

[40]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.