Updatable Key Management Scheme with Intrusion Tolerance for Unattended Wireless Sensor Network

An Unattended Wireless Sensor Network (UWSN) collects the sensing data by using mobile sinks (MSs). It differs from the traditional multi-hop wireless sensor networks in which unbalanced traffic makes the sensors close to the base station deplete their power earlier than others. An UWSN can save the battery power and prolong the network lifetime. Unfortunately, MSs would be given too much privilege when acting as the collecting base station, which will cause security concern if compromised. Besides, UWSNs are usually deployed in unreachable and hostile environments, where sensors can be easily compromised. Thus, their security issues should be carefully addressed to deal with node compromise. In this paper, we present a novel key management scheme to secure UWSNs. We employ the Blundo symmetric polynomial mechanism to guard against the newly compromised nodes in a period while utilizing the periodic key updating based on the reverse hash chain to block the compromised nodes and revoke the compromised MSs if failing the authentication. We show that our scheme is robust against node compromised attacks and carry out comparison analysis on the intrusion-tolerance ratio, communication and computing overhead.

[1]  Haiyun Luo,et al.  Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..

[2]  Sencun Zhu,et al.  Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks , 2008, ACM Trans. Sens. Networks.

[3]  Sencun Zhu,et al.  Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks , 2005, MobiHoc '05.

[4]  Rabi N. Mahapatra,et al.  Key Predistribution Schemes for Establishing Pairwise Keys with a Mobile Sink in Sensor Networks , 2011, IEEE Transactions on Parallel and Distributed Systems.

[5]  Xiaojiang Du,et al.  Maintaining Differentiated Coverage in Heterogeneous Sensor Networks , 2005, EURASIP J. Wirel. Commun. Netw..

[6]  Gene Tsudik,et al.  Security and privacy in emerging wireless networks [Invited Paper] , 2010, IEEE Wireless Communications.

[7]  Subir K. Biswas,et al.  Network-assisted sink navigation for distributed data gathering: Stability and delay-energy trade-offs , 2010, Comput. Commun..

[8]  Ralph C. Merkle,et al.  A Certified Digital Signature , 1989, CRYPTO.

[9]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[10]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[11]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1998, Inf. Comput..

[12]  Ashraf Suyyagh,et al.  Ad Hoc networks security challenges , 2010, 2010 7th International Multi- Conference on Systems, Signals and Devices.

[13]  Giuseppe Anastasi,et al.  Reliable and energy-efficient data collection in sparse sensor networks with mobile elements , 2009, Perform. Evaluation.

[14]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.