DHB-KEY: An efficient key distribution scheme for wireless sensor networks

Real-world deployments of wireless sensor networks require secure communication. In many application cases it is sufficient to provide message authentication at the sink. To implement this requirement using symmetric ciphers, keys shared between each sensor node and the sink have to be established and kept fresh during network operation. This paper presents a key distribution scheme based on the well known elliptic curve Diffie-Hellman key exchange mechanism that allows us to fulfil the previously outlined requirements efficiently. The DHB-KEY scheme requires only the distribution of a single sink-initiated broadcast message to set individual keys on all sensor nodes. Thus, DHB-KEY has a low complexity and preserves scarce resources such as bandwidth and energy. In the paper we present a protocol specification based on the DHB-KEY scheme and its implementation for the well known TinyOS platform. A physical intrusion detection system in an office building is used to evaluate the protocol implementation. The evaluation shows that DHB-KEY is practical in real-world deployments.

[1]  Mihir Bellare,et al.  The Security of the Cipher Block Chaining Message Authentication Code , 2000, J. Comput. Syst. Sci..

[2]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[3]  Bhaskar Krishnamachari,et al.  An adaptive energy-efficient and low-latency MAC for data gathering in wireless sensor networks , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..

[4]  Anupam Joshi,et al.  Security in Sensor Networks , 2020, Texts in Computer Science.

[5]  Cauligi Raghavendra,et al.  An Adaptive Energy-Efficient and Low-Latency MAC for Data Gathering in Sensor Networks , 2003 .

[6]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[7]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[8]  Arno Wacker,et al.  A new approach for establishing pairwise keys for securing wireless sensor networks , 2005, SenSys '05.

[9]  Mohammad A. Hoque,et al.  Modified Algorithms for Multilevel GRSB Protocol , 2007 .

[10]  Cormac J. Sreenan,et al.  Reliability Control for Aggregation in Wireless Sensor Networks , 2007, 32nd IEEE Conference on Local Computer Networks (LCN 2007).

[11]  Bhaskar Krishnamachari,et al.  (www.interscience.wiley.com) DOI: 10.1002/wcm.503 An adaptive energy-efficient and low-latency MAC for tree-based data gathering in sensor networks , 2022 .

[12]  Cormac J. Sreenan,et al.  Adding preemption to TinyOS , 2007, EmNets '07.

[13]  Jinshu Su,et al.  LBKERS: A New Efficient Key Management Scheme for Wireless Sensor Networks , 2007, MSN.

[14]  Paul G. Spirakis,et al.  Design, Analysis and Performance Evaluation of Group Key Establishment in Wireless Sensor Networks , 2007, WCAN@ICALP.

[15]  Tony Chung Poster Abstract : DHB-KEYA Diffie-Hellman Key Distribution Protocol for Wireless Sensor Networks , 2007 .

[16]  Peng Ning,et al.  Mitigating DoS attacks against broadcast authentication in wireless sensor networks , 2008, TOSN.

[17]  Ricardo Dahab,et al.  NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks , 2008, EWSN.

[18]  Cormac J. Sreenan,et al.  Opportunistic Aggregation over Duty Cycled Communications in Wireless Sensor Networks , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).