Key Distribution using Double Keyed-hash Chains for Wireless Sensor Networks

As a security primitive, key establishment plays the most crucial role in the designing of the security mechanism in the wireless sensor networks (WSNs). Unfortunately, the resource limitation of sensor nodes poses a great challenge for designing an efficient and effective key establishment scheme for WSNs. In this paper, we propose an effective key predistribution scheme using double keyed-hash chain schemes. In the proposed scheme, there are two key pools: upward key pools and downward key pools, and the key ring in each sensor is picked from these two key pools. The proposed scheme is analyzed based on connectivity, resistance against attacks, memory consumption and communication overhead. Comparing with the EG scheme and the q-composite scheme, our scheme performs better in terms of network resilience to node capture with little additional overhead cost.

[1]  Faramarz Fekri,et al.  A multivariate key-establishment scheme for wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.

[2]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[3]  Kirk Martinez,et al.  Environmental Sensor Networks , 2005 .

[4]  Hao Wang,et al.  Wireless Sensor Networks for an Extended City Intelligent Transportation System , 2011 .

[5]  Albert Levi,et al.  Increasing Resiliency in Multi-phase Wireless Sensor Networks: Generationwise Key Predistribution Approach , 2011, Comput. J..

[6]  Claude Castelluccia,et al.  RoK: A robust key pre-distribution protocol for multi-phase wireless sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[7]  Bin Wang,et al.  A Strong and Efficient User Authentication Protocol for Wireless Sensor Networks Using Smart Card , 2012 .

[8]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[9]  Paulo S. L. M. Barreto,et al.  A survey on key management mechanisms for distributed Wireless Sensor Networks , 2010, Comput. Networks.

[10]  Taekyoung Kwon,et al.  Location-based pairwise key predistribution for wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.

[11]  Hangyang Dai,et al.  Key Predistribution Approach in Wireless Sensor Networks Using LU Matrix , 2010, IEEE Sensors Journal.

[12]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[13]  Rabi N. Mahapatra,et al.  Key Predistribution Schemes for Establishing Pairwise Keys with a Mobile Sink in Sensor Networks , 2011, IEEE Transactions on Parallel and Distributed Systems.

[14]  Atsuko Miyaji,et al.  RPoK: A Strongly Resilient Polynomial-Based Random Key Pre-Distribution Scheme for Multiphase Wireless Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[15]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[16]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[17]  Kirk Martinez,et al.  Glacsweb: a sensor network for hostile environments , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[18]  Xingming Sun,et al.  An efficient and scalable pairwise key pre-distribution scheme for sensor networks using deployment knowledge , 2009, Comput. Commun..

[19]  Ashok Kumar Das A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks , 2012, International Journal of Information Security.

[20]  Ertan Onur,et al.  WIRELESS SENSOR NETWORKS FOR SECURITY: ISSUES AND CHALLENGES , 2006 .

[21]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[22]  Yunghsiang Sam Han,et al.  A key predistribution scheme for sensor networks using deployment knowledge , 2006, IEEE Transactions on Dependable and Secure Computing.