An Energy-Efficient Key Predistribution Scheme for Secure Wireless Sensor Networks Using Eigenvector

Currently, sensor networks are widely used in various fields. Here secure operations are required for critical applications since the damages are significant if the network is compromised or disrupted. For the security of wireless sensor network, the earlier schemes typically employ asymmetric cryptography. These schemes are, however, often unsuitable for wireless sensor network due to the limited computational power and energy of the sensor nodes. To address this issue, various approaches have been developed, and the random key predistribution approach has been recognized as an effective approach. One shortcoming, however, is that a common key is not guaranteed to be found between any two nodes wanting to communicate. This paper proposes a new robust key predistribution scheme solving this problem, with which the security is not compromised even though the data exchanged between the nodes are tapped by an adversary. This is achieved by using the keys assigned based on the notion of eigenvalue and eigenvector of a square matrix of a pool of keys. Mathematical analysis and computer simulation reveal that the proposed scheme significantly reduces the overhead required for secure connectivity and energy consumption of sensor nodes compared to the existing approaches.

[1]  Yue Qi,et al.  An Efficient and Secure Key Management Scheme for Hierarchical Wireless Sensor Networks , 2012 .

[2]  Pardeep Kumar,et al.  An efficient key pre-distribution scheme for wireless sensor network using public key cryptography , 2010, The 6th International Conference on Networked Computing and Advanced Information Management.

[3]  Shuhua Wang,et al.  K ey pre-distribution using combinatorial designs for wireless sensor networks , 2013 .

[4]  Hee Yong Youn,et al.  Tree-Based Clustering(TBC) for Energy Efficient Wireless Sensor Networks , 2010, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops.

[5]  Song Guo A Compromise-Resilient Pair-wise Rekeying Protocol in Large-Scale Wireless Sensor Networks , 2010 .

[6]  Honggang Wang,et al.  Scaling Laws of Key Predistribution Protocols in Wireless Sensor Networks , 2011, IEEE Transactions on Information Forensics and Security.

[7]  Mohsen Guizani,et al.  An Efficient Signal-Range-Based Probabilistic Key Predistribution Scheme in a Wireless Sensor Network , 2009, IEEE Transactions on Vehicular Technology.

[8]  Rekha Jain,et al.  Wireless Sensor Network -A Survey , 2013 .

[9]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[10]  Hermann de Meer,et al.  Dynamic key management in wireless sensor networks: A survey , 2013, J. Netw. Comput. Appl..

[11]  Yacine Challal,et al.  A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks , 2013, IEEE Transactions on Wireless Communications.

[12]  Junghyun Lee,et al.  Energy Efficient Key Management Protocol in Wireless Sensor Networks , 2010 .

[13]  Hee Yong Youn,et al.  An Efficient Dispersal and Encryption Scheme for Secure Distributed Information Storage , 2003, International Conference on Computational Science.

[14]  David Joyner,et al.  Linear Algebra with Applications , 1998 .

[15]  Subhamoy Maitra,et al.  A Key Pre-distribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design , 2005, ISC.

[16]  Biswanath Mukherjee,et al.  Wireless sensor network survey , 2008, Comput. Networks.

[17]  Douglas R. Stinson,et al.  A unified approach to combinatorial key predistribution schemes for sensor networks , 2014, IACR Cryptol. ePrint Arch..

[18]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[19]  Radha Sankararajan,et al.  Improved Key Predistribution Scheme in Wireless Sensor Networks Using Cell Splitting in Hexagonal Grid Based Deployment Model , 2009, Int. J. Distributed Sens. Networks.

[20]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[22]  Sarbari Mitra,et al.  A Hierarchical Deterministic Key Pre-distribution for WSN Using Projective Planes , 2011, ADHOCNETS.

[23]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[24]  Saber Banihashemian,et al.  A new key management scheme in heterogeneous wireless sensor networks , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).

[25]  Hsiao-Hwa Chen,et al.  Selecting key management schemes for WSN applications , 2012, Comput. Secur..

[26]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[27]  Heribert Baldus,et al.  A Deterministic Pairwise Key Pre-distribution Scheme for Mobile Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[28]  Paul Erdös,et al.  On random graphs, I , 1959 .

[29]  Jianfeng Ma,et al.  Asymmetric Key Pre-distribution Scheme for sensor networks , 2009, IEEE Trans. Wirel. Commun..

[30]  Azzedine Boukerche,et al.  Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..

[31]  Naixue Xiong,et al.  An energy-efficient scheme in next-generation sensor networks , 2010 .

[32]  Hee Yong Youn,et al.  An Energy Efficient Routing Protocol in Wireless Sensor Networks , 2009, 2009 International Conference on Computational Science and Engineering.

[33]  Markus G. Kuhn,et al.  Tamper resistance: a cautionary note , 1996 .

[34]  Bülent Yener,et al.  Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, ESORICS.

[35]  Paulo S. L. M. Barreto,et al.  A survey on key management mechanisms for distributed Wireless Sensor Networks , 2010, Comput. Networks.

[36]  Piotr Szczechowiak,et al.  Practical Identity-Based Key Agreement For Secure Communication in Sensor Networks , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.

[37]  Farooq Anjum,et al.  Location dependent key management in sensor networks without using deployment knowledge , 2007, 2007 2nd International Conference on Communication Systems Software and Middleware.

[38]  Theodore Y. Ts'o,et al.  Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.

[39]  Abhishek Goyal,et al.  Distributed Energy Efficient Key Distribution for Dense Wireless Sensor Networks , 2009, 2009 First International Conference on Computational Intelligence, Communication Systems and Networks.

[40]  T. Subash,et al.  Novel key pre-distribution scheme in wireless sensor network , 2011, 2011 International Conference on Emerging Trends in Electrical and Computer Technology.

[41]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1998, Inf. Comput..

[42]  Huagang Xiong,et al.  An Efficient Key Management Scheme for Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.

[43]  Bülent Yener,et al.  Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, IEEE/ACM Transactions on Networking.

[44]  Sushmita Ruj,et al.  Revisiting Key Predistribution Using Transversal Designs for a Grid-Based Deployment Scheme , 2009, Int. J. Distributed Sens. Networks.

[45]  Douglas R. Stinson,et al.  On the Construction of Practical Key Predistribution Schemes for Distributed Sensor Networks Using Combinatorial Designs , 2008, TSEC.

[46]  Rongbo Zhu,et al.  Energy-Aware Distributed Intelligent Data Gathering Algorithm in Wireless Sensor Networks , 2011, Int. J. Distributed Sens. Networks.

[47]  Donggang Liu,et al.  Attack-Resistant Location Estimation in Wireless Sensor Networks , 2008, TSEC.