Key Levels and Securing Key Predistribution against Node Captures

We consider key predistribution schemes deployed for securing communication in ad hoc networks of tiny devices. As node captures are inevitable in these networks and the devices are likely non tamper-proof, an adversary can collect the keys and decrypt some transmissions. We propose and analyze key levels technique that can be used on top of most key predistribution schemes in order to reduce chances of an adversary. The modification does not increase the number of keys loaded into a device, while it increases the computational cost in an insignificant way. Also, it composes well into a framework of adaptive key management allowing to refresh the keys without causing incompatibility problems with the devices holding the old keys. Finally, we show how to reduce the number of keys in a device for random key predistribution by an appropriate construction of the pool of keys.

[1]  Leon G. Higley,et al.  Forensic Entomology: An Introduction , 2009 .

[2]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[3]  Tanmoy Kanti Das,et al.  Diverging Keys in Wireless Sensor Networks , 2006, ISC.

[4]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[5]  Danièle Gardy Occupancy urn models in the analysis of algorithms , 2002 .

[6]  Wojciech Szpankowski,et al.  Average Case Analysis of Algorithms on Sequences: Szpankowski/Average , 2001 .

[7]  Marc Joye,et al.  Topics in Cryptology — CT-RSA 2003 , 2003 .

[8]  W. Szpankowski Average Case Analysis of Algorithms on Sequences , 2001 .

[9]  Yunghsiang Sam Han,et al.  A key predistribution scheme for sensor networks using deployment knowledge , 2006, IEEE Transactions on Dependable and Secure Computing.

[10]  Mihir Bellare,et al.  Forward-Security in Private-Key Cryptography , 2003, CT-RSA.

[11]  Donggang Liu,et al.  Improving key predistribution with deployment knowledge in static sensor networks , 2005, TOSN.

[12]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[13]  Thomas F. La Porta,et al.  Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks , 2007, IEEE Trans. Mob. Comput..

[14]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.