A key pre-distribution scheme for wireless sensor networks

Key technological advances in wireless communications, micro electro mechanical systems (MEMS), and digital circuitry have energized the research community to focus on the challenges of wireless sensor networks. In this paper, we propose a new pre-distribution key management scheme that meets the operational and security requirements of wireless sensor networks and provides authentication and key distribution in one set of protocols. Our scheme allows selective key revocation and node rekeying and posits improved network resiliency over existing key pre-distribution schemes. The scheme is based on probability key sharing among sensor nodes of a random graph and incorporates a threshold property. Uncompromised nodes in a sensor network are secure provided that an adversary compromises less than a threshold-number of nodes. We describe the details of our algorithm and briefly compare it with other proposed schemes.

[1]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[2]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[3]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[4]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[5]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.

[6]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[7]  Jeffrey W. Herrmann,et al.  Improving simulation model adaptability with a production control framework , 2001, Proceeding of the 2001 Winter Simulation Conference (Cat. No.01CH37304).

[8]  Miodrag Potkonjak,et al.  Coverage problems in wireless ad-hoc sensor networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[9]  Mihir Bellare,et al.  Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..