Key splitting: making random key distribution schemes resistant against node capture

A large number of random key pre-distribution RKD schemes have been proposed in the literature to secure wireless sensor network applications, relying on symmetric key cryptography. However, sensor nodes are exposed to physical compromise by adversaries, who target the symmetric keys stored at each node. With the stolen keys in their possession, the adversaries are then able to compromise communication links between benign nodes. Here, the big challenge arises: how to increase resilience of RKD schemes for wireless sensor networks to node capture, while maintaining the flexibility and low-cost features of RKD? We propose the idea of key splitting to address this problem, without the need of any special-purpose hardware. Our key splitting scheme neither increases per-node storage nor introduces additional computation and communication overheads. Nevertheless, it can achieve better connectivity. More importantly, it significantly increases resilience to node compromise, when the adversary does not have overwhelming computational power. Copyright © 2014 John Wiley & Sons, Ltd.

[1]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[2]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[3]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[4]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[5]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[6]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[7]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[8]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.

[9]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[10]  Elaine Shi,et al.  Designing secure sensor networks , 2004, IEEE Wireless Communications.

[11]  Shiuh-Pyng Shieh,et al.  Adaptive Random Key Distribution Schemes for Wireless Sensor Networks , 2005 .

[12]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[13]  Richard Han,et al.  Node Compromise in Sensor Networks: The Need for Secure Systems ; CU-CS-990-05 , 2005 .

[14]  Peter Langendörfer,et al.  How public key cryptography influences wireless sensor node lifetime , 2006, SASN '06.

[15]  Tyler Moore A collusion attack on pairwise key predistribution schemes for distributed sensor networks , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[16]  Panagiotis Papadimitratos,et al.  Towards provable secure neighbor discovery in wireless networks , 2008, FMSE '08.

[17]  Panagiotis Papadimitratos,et al.  Secure neighbor discovery in wireless networks: formal investigation of possibility , 2008, ASIACCS '08.

[18]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[19]  Peng Ning,et al.  2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .

[20]  Yong Jae Lee,et al.  Simple, extensible and flexible random key predistribution schemes for wireless sensor networks using reusable key pools , 2010, J. Intell. Manuf..

[21]  Panagiotis Papadimitratos,et al.  A randomized countermeasure against parasitic adversaries in wireless sensor networks , 2010, IEEE Journal on Selected Areas in Communications.

[22]  Panagiotis Papadimitratos,et al.  Resilient data aggregation for unattended WSNs , 2011, 2011 IEEE 36th Conference on Local Computer Networks.

[23]  Jiankun Hu,et al.  Hashed Random Key Pre-distribution Scheme for Large Heterogeneous Sensor Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[24]  Vashek Matyas,et al.  Two Improvements of Random Key Predistribution for Wireless Sensor Networks , 2012, SecureComm.

[25]  Panagiotis Papadimitratos,et al.  Stealthy pre-attacks against random key pre-distribution security , 2012, 2012 IEEE International Conference on Communications (ICC).

[26]  Panagiotis Papadimitratos,et al.  Key splitting for random key distribution schemes , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).