Scaling Laws of Key Predistribution Protocols in Wireless Sensor Networks

Many key predistribution (KP) protocols have been proposed and are well accepted in randomly deployed wireless sensor networks (WSNs). Being distributed and localized, they are perceived to be scalable as node density and network dimension increase. While it is true in terms of communication/computation overhead, their scalability in terms of security performance is unclear. In this paper, we conduct a detailed study on this issue. In particular, we define a new metric called Resilient Connectivity (RC) to quantify security performance in WSNs. We then conduct a detailed analytical investigation on how KP protocols scale with respect to node density and network dimension in terms of RC in randomly deployed WSNs. Based on our theoretical analysis, we state two scaling laws of KP protocols. Our first scaling law states that KP protocols are not scalable in terms of RC with respect to node density. Our second scaling law states that KP protocols are not scalable in terms of RC with respect to network dimension. In order to deal with the unscalability of the above two scaling laws, we further propose logical and physical group deployment, respectively. We validate our findings further using extensive theoretical analysis and simulations.

[1]  David G. Andersen,et al.  Proceedings of Usits '03: 4th Usenix Symposium on Internet Technologies and Systems Mayday: Distributed Filtering for Internet Services , 2022 .

[2]  R. Poovendran,et al.  A Set-Covering Approach for Modeling Attacks on Key Predistribution in Wireless Sensor Networks , 2005, 2005 3rd International Conference on Intelligent Sensing and Information Processing.

[3]  A. S. Poornima,et al.  Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks , 2009 .

[4]  Deep Medhi,et al.  A Byzantine resilient multi-path key establishment scheme and its robustness analysis for sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[5]  Xun Wang,et al.  Analyzing the secure overlay services architecture under intelligent DDoS attacks , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..

[6]  Wenjing Lou,et al.  LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[7]  Donggang Liu,et al.  Group-based key pre-distribution in wireless sensor networks , 2005, WiSe '05.

[8]  Takashi Ito,et al.  A key pre-distribution scheme for secure sensor networks using probability density function of node deployment , 2005, SASN '05.

[9]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[10]  Bülent Yener,et al.  Key distribution mechanisms for wireless sensor networks : a survey , 2005 .

[11]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.

[12]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[13]  Yongdae Kim,et al.  Revisiting random key pre-distribution schemes for wireless sensor networks , 2004, SASN '04.

[14]  Yunho Lee,et al.  A New Efficient Key Management Protocol for Wireless Sensor and Actor Networks , 2009, ArXiv.

[15]  Angelos D. Keromytis,et al.  SOS: secure overlay services , 2002, SIGCOMM '02.

[16]  Deep Medhi,et al.  Source routing based pairwise key establishment protocol for sensor networks , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..

[17]  Kwangjo Kim,et al.  State-based key management scheme for wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[18]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[19]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[20]  Dharma P. Agrawal,et al.  Efficient pairwise key establishment and management in static wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[21]  Roberto Di Pietro,et al.  Efficient and resilient key discovery based on pseudo-random key pre-deployment , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..

[22]  Thomas F. La Porta,et al.  Establishing Pair-Wise Keys in Heterogeneous Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[23]  Radha Poovendran,et al.  A key management scheme in distributed sensor networks using attack probabilities , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[24]  Roberto Di Pietro,et al.  Random key-assignment for secure Wireless Sensor Networks , 2003, SASN '03.

[25]  Anish Arora,et al.  Analyzing the yield of ExScal, a large-scale wireless sensor network experiment , 2005, 13TH IEEE International Conference on Network Protocols (ICNP'05).

[26]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.

[27]  Faramarz Fekri,et al.  Key pre-distribution in wireless sensor networks using multivariate polynomials , 2005, 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005..

[28]  Taieb Znati,et al.  Path key establishment using multiple secured paths in wireless sensor networks , 2005, CoNEXT '05.

[29]  Deborah Estrin,et al.  An energy-efficient MAC protocol for wireless sensor networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[30]  Ion Stoica,et al.  Taming IP packet flooding attacks , 2004, Comput. Commun. Rev..

[31]  Panganamala Ramana Kumar,et al.  RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .

[32]  Deep Medhi,et al.  Location-aware key management scheme for wireless sensor networks , 2004, SASN '04.

[33]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[34]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[35]  Yong Guan,et al.  A key pre-distribution scheme using deployment knowledge for wireless sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[36]  Chinya V. Ravishankar,et al.  Efficient key establishment for group-based wireless sensor deployments , 2005, WiSe '05.

[37]  Myong-Soon Park,et al.  An AVL Tree-Based Dynamic Key Management in Hierarchical Wireless Sensor Network , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[38]  Jiang Wu,et al.  Product Construction of Key Distribution Schemes for Sensor Networks , 2004, Selected Areas in Cryptography.

[39]  Dijiang Huang,et al.  RINK-RKP: a scheme for key predistribution and shared-key discovery in sensor networks , 2005, PCCC 2005. 24th IEEE International Performance, Computing, and Communications Conference, 2005..

[40]  Douglas R. Stinson,et al.  Deterministic Key Predistribution Schemes for Distributed Sensor Networks , 2004, Selected Areas in Cryptography.

[41]  Douglas R. Stinson,et al.  A combinatorial approach to key predistribution for distributed sensor networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[42]  Shouhuai Xu,et al.  Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..

[43]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[44]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[45]  Roberto Di Pietro,et al.  Connectivity properties of secure wireless sensor networks , 2004, SASN '04.

[46]  Arno Wacker,et al.  A new approach for establishing pairwise keys for securing wireless sensor networks , 2005, SenSys '05.

[47]  Adrian Perrig,et al.  PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[48]  Nitin H. Vaidya,et al.  Leveraging Channel Diversity for Key Establishment in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[49]  Min Wu,et al.  Coordinated sensor deployment for improving secure communications and sensing coverage , 2005, SASN '05.

[50]  J. Spencer The Strange Logic of Random Graphs , 2001 .

[51]  Brighten Godfrey,et al.  OpenDHT: a public DHT service and its uses , 2005, SIGCOMM '05.

[52]  Tian Bu,et al.  Trading resiliency for security: model and algorithms , 2004, Proceedings of the 12th IEEE International Conference on Network Protocols, 2004. ICNP 2004..

[53]  Bülent Yener,et al.  Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, IEEE/ACM Transactions on Networking.

[54]  Venkatesh Sarangan,et al.  Key management in wireless sensor networks with inter-network sensor roaming , 2008, 2008 33rd IEEE Conference on Local Computer Networks (LCN).

[55]  Yuguang Fang,et al.  LLK: a link-layer key establishment scheme for wireless sensor networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[56]  Donggang Liu,et al.  Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.

[57]  Faramarz Fekri,et al.  Threshold Key-Establishment in Distributed Sensor Networks Using a Multivariate Scheme , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[58]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[59]  Tarek F. Abdelzaher,et al.  Range-free localization schemes for large scale sensor networks , 2003, MobiCom '03.

[60]  Xun Wang,et al.  On the effectiveness of secure overlay forwarding systems under intelligent distributed DoS attacks , 2006, IEEE Transactions on Parallel and Distributed Systems.