Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1098918.1098922acmconferencesArticle/Chapter ViewAbstractPublication PagessensysConference Proceedingsconference-collections
Article

A new approach for establishing pairwise keys for securing wireless sensor networks

Published: 02 November 2005 Publication History

Abstract

Wireless sensor networks based on highly resource-constrained devices require symmetric cryptography in order to make them secure. Integral to this is the exchange of unique symmetric keys between two devices. In this paper, we propose a novel decentralized key exchange protocol that guarantees the confidentiality of a key exchange even if an attacker has compromised some of the devices in the network. A central objective of the protocol design was to minimize resource consumption on the individual devices. We evaluate the resource requirements of our protocol in terms of memory requirements, CPU usage and network traffic both through theoretical analysis and through simulations.

References

[1]
A. Wacker, T. Heiber, and H. Cermann, "A key-distribution scheme for wireless home automation networks," in Proceedings of IEEE CCNC 2004, IEEE Communications Society. Las Vegas, Nevada, USA:, Jan., 5-8 2004.
[2]
M. Brown and D. Cheung, "PGP in constrained wireless devices," in Proceedings of the 9th USENIX Security Symposium, 2000.
[3]
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in IEEE Symposium on Security and Privacy, May 2003.
[4]
L. Zhou and Z. J. Haas, "Securing ad hoc networks," IEEE Network, vol. 13, no. 6, pp. 24--30, 1999.
[5]
L. Gong, "Increasing availability and security of an authentication service," IEEE Journal on Selected Areas in Communications, vol. 11, no. 5, pp. 657--662, 1993.
[6]
A. Itah and M. Rodeh, "The multi-tree approach to reliability in distributed networks." in Proceedings of the 25th Symposium on FOCS, 1984.
[7]
D. Sidhu, S. Abdallah, and R. Nair, "A distance vector algorithm for alternate path routing." 1990, submitted for publication.
[8]
S. J. Lee and M. Gerla, "Split multipath routing with maximally disjoint paths in ad hoc networks." in IEEE International Conference on Communications, 2001, pp. 3201--3205.
[9]
A. Srinivas and E. Modiano, "Minimum energy disjoint path routing in wireless ad hoc networks." in ACM Mobicom, 2003.
[10]
J. W. Suurballe, "Disjoint paths in a network." Networks, vol. 4, pp. 125--144, 1974.
[11]
K. Menger, "Zur allgemeinen Kurventheorie," Fund. Math., no. 10, pp. 96--115, 1927.
[12]
A. Wacker, T. Heiber, H. Cermann, and P. J. Marrón, "A fault-tolerant key-distribution scheme for securing wireless ad-hoc networks," in Proceedings of the second Conference on Pervasive Computing, Pervasive 2004. Vienna, Austria: Springer-Verlag, April, 19-23 2004.
[13]
S. Even and R. E. Tarjan, "Network flow and testing graph connectivity," SIAM Journal on Computing, vol. 4, no. 4, pp. 507--518, Dec. 1975.
[14]
J.-P. Hubaux, L. Buttyan, and S. Capkun, "The quest for security in mobile ad hoc networks," in Proceeding of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), 2001, pp. 146--155.
[15]
D. Carman, P. Kruus, and B. Matt, "Constraints and approaches for distributed sensor network security," NAI Labs, Tech. Rep. #00-010, Sept. 2000.
[16]
C. Karlof, N. Sastry, and D. Wagner, "Tinysec: a link layer security architecture for wireless sensor networks," in SenSys '04: Proceedings of the 2nd international conference on Embedded networked sensor systems. New York, NY, USA: ACM Press, November 3--5 2004, pp. 162--175.
[17]
V. Gupta, M. Millard, S. Fung, Y. Zhu, N. Gura, and S. Shantz, "Sizzle: a standards-based end-to-end security architecture for the embedded internet," in Proceedings of Third IEEE International Conference on Pervasive Computing and Communications, PerCom 2005. Kauai, Hawaii: IEEE, March 8--12 2005, pp. 247--256.
[18]
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Elsevier's AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, vol. 1, no. 2--3, pp. 293--315, September 2003.
[19]
A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar, "SPINS: Security protocols for sensor networks," in Mobile Computing and Networking, 2001, pp. 189--199.
[20]
S. Basagni, K. Herrin, D. Bruschi, and E. Rosti, "Secure pebblenets," in Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing, 2001, pp. 156--163.
[21]
L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," in Proceedings of the 9th ACM Conference on Computer and Communication Security (CCS-02), 18--22 2002, pp. 41--47.
[22]
S. Zhu, S. Xu, S. Setia, and S. Jajodia, "Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach," George Mason University, Tech. Rep. ISE-TR-03-01, Mar. 2003.
[23]
H. Chan and A. Perrig, "PIKE: Peer intermediaries for key establishment in sensor networks," in Proceedings of IEEE Infocom, Mar. 2005.
[24]
"Crossbow Technology Inc.: Motes, Smart Dust Sensors, Wireless Sensor Networks," Webpage. {Online}. Available: http://www.xbow.com
[25]
D. Herrscher, S. Maier, J. Tian, and K. Rothermel, "A Novel Approach to Evaluating Implementations of Location-Based Software," in Proceedings of the 2004 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS 2004), San Jose, CA, USA, July 25--29 2004, pp. 484--490.

Cited By

View all
  • (2019)Security and Privacy Issues in Wireless Sensor NetworksIoT and Analytics for Agriculture10.1007/978-981-13-9177-4_9(187-210)Online publication date: 2-Oct-2019
  • (2017)Remote monitoring system for agricultural information based on wireless sensor networkJournal of the Chinese Institute of Engineers10.1080/02533839.2016.127314040:1(75-81)Online publication date: 9-Feb-2017
  • (2016)Secure authentication approach using Diffie-Hellman key exchange algorithm for WSNInternational Journal of Communication Networks and Distributed Systems10.1504/IJCNDS.2016.07910217:2(189-201)Online publication date: 1-Jan-2016
  • Show More Cited By

Index Terms

  1. A new approach for establishing pairwise keys for securing wireless sensor networks

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SenSys '05: Proceedings of the 3rd international conference on Embedded networked sensor systems
      November 2005
      340 pages
      ISBN:159593054X
      DOI:10.1145/1098918
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 02 November 2005

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. key establishment
      2. wireless sensor network security

      Qualifiers

      • Article

      Conference

      SenSys05: ACM Conference on Embedded Network Sensor Systems
      November 2 - 4, 2005
      California, San Diego, USA

      Acceptance Rates

      Overall Acceptance Rate 174 of 867 submissions, 20%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)1
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 13 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2019)Security and Privacy Issues in Wireless Sensor NetworksIoT and Analytics for Agriculture10.1007/978-981-13-9177-4_9(187-210)Online publication date: 2-Oct-2019
      • (2017)Remote monitoring system for agricultural information based on wireless sensor networkJournal of the Chinese Institute of Engineers10.1080/02533839.2016.127314040:1(75-81)Online publication date: 9-Feb-2017
      • (2016)Secure authentication approach using Diffie-Hellman key exchange algorithm for WSNInternational Journal of Communication Networks and Distributed Systems10.1504/IJCNDS.2016.07910217:2(189-201)Online publication date: 1-Jan-2016
      • (2016)Latest developments on dynamic key management for dynamic wireless sensor networks2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT)10.1109/ICEEOT.2016.7754859(1119-1124)Online publication date: Mar-2016
      • (2013)SPIKE: A novel session key management protocol with time-varying secure cluster formation in wireless sensor networks2013 Eleventh Annual Conference on Privacy, Security and Trust10.1109/PST.2013.6596049(151-160)Online publication date: Jul-2013
      • (2011)An application-driven attack probability-based deterministic pairwise key pre-distribution scheme for non-uniformly deployed sensor networksInternational Journal of Sensor Networks10.1504/IJSNET.2011.0387629:2(89-106)Online publication date: 1-Mar-2011
      • (2011)Scaling Laws of Key Predistribution Protocols in Wireless Sensor NetworksIEEE Transactions on Information Forensics and Security10.1109/TIFS.2011.21590016:4(1370-1381)Online publication date: 1-Dec-2011
      • (2010)A rank-based application-driven resilient reputation framework model for wireless sensor networks2010 International Conference on Computer Application and System Modeling (ICCASM 2010)10.1109/ICCASM.2010.5623072(V9-125-V9-129)Online publication date: Oct-2010
      • (2010)A Permutation-Based Multi-Polynomial Scheme for Pairwise Key Establishment in Sensor Networks2010 IEEE International Conference on Communications10.1109/ICC.2010.5502141(1-5)Online publication date: May-2010
      • (2010)Backbone Routing over Multihop Wireless Networks: Increased Network Coding Opportunity2010 IEEE International Conference on Communications10.1109/ICC.2010.5502058(1-5)Online publication date: May-2010
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media