SCON: Secure management of continuity in sensor networks

Due to limited energy capacity of batteries, the function lifetime of sensor networks in general is longer than the operational lifetime of single nodes. Therefore, to keep the network working, multiple deployments of sensor nodes are needed. Due to their nature and their operational resource constraints, sensor networks are vulnerable to various types of attacks. Key pre-distribution has been shown to be an effective way to establish secure communication in sensor networks. However, existing schemes of key pre-distribution assume the use of the same pools in various deployments of sensors. We analyzed the vulnerability of the existing key pre-distribution schemes arising out of the repeated use of fixed key information through multiple deployments. We also developed SCON, an approach for key management that provides a significant improvement in security through the use of a unique key pool for each phase of deployment. Nodes of different deployments connect through special nodes called bridge nodes which have keys from adjacent key pools of respective deployments. Furthermore, we show that SCON can perform better by taking advantage of more powerful nodes used as bridge nodes.

[1]  Donggang Liu,et al.  Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.

[2]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[3]  Arjan Durresi,et al.  Security-Performance Tradeoffs of Inheritance based Key Predistribution for Wireless Sensor Networks , 2004, ArXiv.

[4]  Dimitrios Makrakis,et al.  Sensor-based information appliances , 2000 .

[5]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[6]  Pradeep K. Khosla,et al.  SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[7]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.

[8]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[9]  John T. Kohl,et al.  The Kerberos Network Authentication Service (V5 , 2004 .

[10]  Dawn Song,et al.  Key distribution techniques for sensor networks , 2004 .

[11]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[12]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[13]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[14]  Ian F. Akyildiz,et al.  Wireless sensor and actor networks: research challenges , 2004, Ad Hoc Networks.

[15]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[16]  J. Spencer The Strange Logic of Random Graphs , 2001 .

[17]  Jerome H. Saltzer,et al.  Kerberos authentication and authorization system , 1987 .

[18]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[19]  Peter Kruus,et al.  CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .