Analysis for Location-Based Key Pre-distribution in Wireless Sensor Networks

Wireless sensor networks play key roles in many applications. They are often deployed in hostile environment where communications between sensor nodes must be encrypted. This requires the establishment of secure keys between the sensor nodes in the wireless sensor networks. As one of the methods establishing pairwise keys, location-based key pre-distribution scheme takes advantage of the observation that in static wireless sensor network, it is often possible to approximately determine the location of sensor nodes. In this paper, we evaluate the security and connectivity of location-based key pre-distribution scheme when a target field is partitioned using different methods. The analysis in this paper indicates that in the three possible partition methods, the hexagon-based scheme has the highest probability of establishing pairwise keys between sensor nodes, while the triangle-based key scheme can achieve the highest security. The tradeoff between connectivity and security should be taken into consideration in practice.

[1]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[2]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[3]  Donggang Liu,et al.  Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.

[4]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[5]  S. Manesis,et al.  A Survey of Applications of Wireless Sensors and Wireless Sensor Networks , 2005, Proceedings of the 2005 IEEE International Symposium on, Mediterrean Conference on Control and Automation Intelligent Control, 2005..

[6]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[7]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[8]  Elaine Shi,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[9]  Hui Tang,et al.  Modeling on Secure Data Aggregation of Wireless Sensor Networks Based on Evaluation of Creditability , 2010, 2010 International Conference on Internet Technology and Applications.

[10]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[11]  Lingxuan Hu,et al.  Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[12]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[13]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[14]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.