An Energy-Aware Random Pairwise Keys Scheme in Wireless Sensor Networks

In wireless sensor networks, nodes are easy to be compromised by the adversary due to the resource limitations of the sensor nodes. How to reduce the energy consumption of nodes and increase the security becomes the goal of the security technologies. An energy-aware random pairwise keys (ERPK) scheme was proposed in this paper. In the phase of the key-setup, the node identity and the residual energy were stored, and the pairwise keys were generated after the node identity was matched up with the neighbor nodes, the pairwise keys between the node and the neighbor nodes were validated according to the identity and residual energy, then analyzed the security of the ERPK scheme with the multi-hop communication. The performances of the ERPK scheme such as the energy consumption, the lifetime of network and the security were analyzed and simulated. The results show that the ERPK scheme has lower energy consumption and longer network lifetime than those of the random pairwise keys scheme, and also the compromised probability of the nodes is reduced

[1]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[2]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[3]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[4]  Gregory J. Pottie,et al.  Protocols for self-organization of a wireless sensor network , 2000, IEEE Wirel. Commun..

[5]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[6]  Ingrid Verbauwhede,et al.  Reducing radio energy consumption of key management protocols for wireless sensor networks , 2004, Proceedings of the 2004 International Symposium on Low Power Electronics and Design (IEEE Cat. No.04TH8758).

[7]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[8]  Elaine Shi,et al.  Detection of denial-of-message attacks on sensor network broadcasts , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[9]  Donggang Liu,et al.  Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks , 2002, NDSS.

[10]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[11]  Dingli Yu,et al.  A bilinear fault detection observer , 1996, Autom..

[12]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[13]  Ran Canetti,et al.  Efficient and Secure Source Authentication for Multicast , 2001, NDSS.

[14]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[15]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[16]  Miodrag Potkonjak,et al.  On communication security in wireless ad-hoc sensor networks , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.