Threshold Key-Establishment in Distributed Sensor Networks Using a Multivariate Scheme

Key establishment in sensor networks is not a trivial task because of the scale of the network and resource limitations of the sensor nodes. Unfortunately, the previous solutions in general networks are inapplicable to sensor networks. In this paper, we propose a novel multivariate key pre-distribution scheme (MKPS) that simultaneously provides many nice features of previous schemes without any disadvantages such as additional memory. These features include node-to-node authentication, network scalability, key compositeness, perfect secrecy up to the capture of a fraction of nodes, and network connectivity. In this scheme, every node is assigned a unique ID that is an n tuple of positive integers. Based on these IDs, the shares of multivariate polynomials are stored in the memory of every sensor node prior to their deployment. After the deployment, those nodes that are at the communication range of each other and their IDs are at the Hamming distance of one from each other can establish n − 1 common keys. The secret key between such nodes is a symmetric combination of all these n − 1 keys. Hence, the proposed MKPS is in some sense an (n − 1)-composite scheme. We will show that this feature significantly improves the security of MKPS over previous schemes. The proposed method is in the category of threshold schemes, i.e., it remains perfectly secure up to the capture of a certain fraction of sensor nodes. For example, in some instances, the scheme remains almost perfectly secure until 90% of the nodes are captured. We will also propose a procedure to choose an optimal dimension n. In contrast to previous schemes, the design criteria in our scheme are both security and network connectivity. Hence, the proposed scheme provides an opportunity to the designer to adjust the network properties according to the desired application.

[1]  R. Srikant,et al.  Unreliable sensor grids: coverage, connectivity and diameter , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[2]  B. Bollobás The evolution of random graphs , 1984 .

[3]  Roberto Di Pietro,et al.  Random key-assignment for secure Wireless Sensor Networks , 2003, SASN '03.

[4]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[5]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[6]  Faramarz Fekri,et al.  On connectivity properties of large-scale sensor networks , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[7]  Gabor Karsai,et al.  Smart Dust: communicating with a cubic-millimeter computer , 2001 .

[8]  Svante Janson,et al.  Random graphs , 2000, Wiley-Interscience series in discrete mathematics and optimization.

[9]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1998, Inf. Comput..

[10]  Gregory J. Pottie,et al.  Wireless integrated network sensors (WINS) , 1999, Smart Structures.

[11]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[12]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[13]  Adrian Perrig,et al.  Secure broadcast communication in wired and wireless networks , 2002 .

[14]  Randy H. Katz,et al.  Next century challenges: mobile networking for “Smart Dust” , 1999, MobiCom.

[15]  Béla Bollobás,et al.  Random Graphs: Notation , 2001 .

[16]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[17]  Yongdae Kim,et al.  Revisiting random key pre-distribution schemes for wireless sensor networks , 2004, SASN '04.

[18]  P. Erdos,et al.  On the evolution of random graphs , 1984 .

[19]  Shouhuai Xu,et al.  Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..

[20]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[21]  Rolf Blom,et al.  Non-Public Key Distribution , 1982, CRYPTO.

[22]  Adrian Perrig,et al.  Secure Broadcast Communication , 2003, Springer US.