A low-energy key management protocol for wireless sensor networks

Wireless sensor networks have a wide spectrum of civil and military applications that call for security, e.g., target surveillance in hostile environments. Typical sensors possess limited computation, energy, and memory resources; therefore the use of vastly resource-consuming security mechanisms is not possible. In this paper, we propose a cryptographic key management protocol, which is based on the IBSK scheme, but only two symmetric keys are required to be pre-deployed at each sensor. The protocol supports the eviction of the compromised nodes. Simulation shows that the key management is remarkably low thanks to the multi-tier network architecture in which only sensor-to-gateway secure sessions are allowed, and reports order-of-magnitude improvement in energy saving as compared to the original IBSK scheme, and Kerberos-like schemes.

[1]  M. Horton MICA: The Commercialization of Microsensor Motes , 2002 .

[2]  Anantha Chandrakasan,et al.  Energy efficient protocols for low duty cycle wireless microsensor networks , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[3]  B. Otis,et al.  PicoRadios for wireless sensor networks: the next challenge in ultra-low power design , 2002, 2002 IEEE International Solid-State Circuits Conference. Digest of Technical Papers (Cat. No.02CH37315).

[4]  Anantha P. Chandrakasan,et al.  Energy-efficient link layer for wireless microsensor networks , 2001, Proceedings IEEE Computer Society Workshop on VLSI 2001. Emerging Technologies for VLSI Systems.

[5]  Mani Srivastava,et al.  Energy-aware wireless microsensor networks , 2002, IEEE Signal Process. Mag..

[6]  Moustafa Youssef,et al.  Energy-Aware TDMA-Based MAC for Sensor Networks , 2002 .

[7]  Walter Fumy,et al.  Principles of Key Management , 1993, IEEE J. Sel. Areas Commun..

[8]  Nathan Ickes,et al.  Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks , 2001, MobiCom '01.

[9]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[10]  William A. Arbaugh,et al.  Bootstrapping security associations for routing in mobile ad-hoc networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[11]  Mohamed Younis,et al.  Performance evaluation of load-balanced clustering of wireless sensor networks , 2003, 10th International Conference on Telecommunications, 2003. ICT 2003..

[12]  Mohamed F. Younis,et al.  Energy-aware routing in cluster-based sensor networks , 2002, Proceedings. 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems.

[13]  Peter Kruus,et al.  CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .

[14]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[15]  Nathan Ickes,et al.  Physical layer driven algorithm and protocol design for energy-efficient wireless sensor networks , 2002, MobiCom 2001.

[16]  Natsume Matsuzaki,et al.  Key Distribution Protocol for Digital Mobile Communication Systems , 1989, CRYPTO.