A Key Distribution Scheme for WSN Based on Hash Chains and Deployment Knowledge

Based on the deployment knowledge and the irreversibility of some hash chains, a novel pairwise key distribution scheme (DKH-KD) for wireless sensor networks is proposed. In DKH-KD scheme, before the nodes in the network are deployed, the offline server constructs a number of hash chains and uses the values from a pair of reverse hash chains to establish their pairwise keys among the nodes in the same region, while, among the neighbor nodes in the different regions, some pairs of the hash chains based on the deployment knowledge are employed to establish the pairwise keys. These procedures make the attackers hard to break the network and ensure that the probability of the pairwise key establishment is close to 1. Compared with the Dai scheme and the q-composite's scheme, our analyses show that DKH-KD scheme can improve the probability of the pairwise key establishment and the invulnerability more efficiently.

[1]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[2]  Abhishek Pandey,et al.  A Survey on Wireless Sensor Networks Security , 2010 .

[3]  Peter Schwabe,et al.  SHA-3 on ARM11 Processors , 2012, AFRICACRYPT.

[4]  Douglas R. Stinson,et al.  A combinatorial approach to key predistribution for distributed sensor networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[5]  John Pham,et al.  Lightweight Implementations of SHA-3 Candidates on FPGAs , 2011, INDOCRYPT.

[6]  Chih-Chun Chang,et al.  Measurement of Energy Costs of Security in Wireless Sensor Nodes , 2007, 2007 16th International Conference on Computer Communications and Networks.

[7]  Kalpana Sharma,et al.  Wireless Sensor Networks: An Overview on its Security Threats , 2010 .

[8]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[9]  Eunmi Choi,et al.  A High Connectivity Pre-Distribution Key Management Scheme in Grid-Based Wireless Sensor Networks , 2008, 2008 International Conference on Convergence and Hybrid Information Technology.

[10]  James Docherty,et al.  A flexible hardware implementation of SHA-1 and SHA-2 Hash Functions , 2011, 2011 IEEE International Symposium of Circuits and Systems (ISCAS).

[11]  Hangyang Dai,et al.  An improved polynomial-based key predistribution scheme for wireless sensor networks , 2008, 2008 International Conference on Communications, Circuits and Systems.

[12]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[13]  Michael Hutter,et al.  Pushing the Limits of SHA-3 Hardware Implementations to Fit on RFID , 2013, CHES.

[14]  Yacine Challal,et al.  A new class of Hash-Chain based key pre-distribution schemes for WSN , 2013, Comput. Commun..

[15]  Donggang Liu,et al.  Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.

[16]  Yaser Jararweh,et al.  Hardware Performance Evaluation of SHA-3 Candidate Algorithms , 2012, J. Information Security.

[17]  Bülent Yener,et al.  Combinatorial design of key distribution mechanisms for wireless sensor networks , 2007, TNET.

[18]  Taekyoung Kwon,et al.  Location-based pairwise key predistribution for wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.