Lightweight key renewals for clustered sensor networks

被引:12
作者
Wang G. [1 ]
Kim S. [1 ]
Kang D. [2 ]
Choi D. [2 ]
Cho G. [3 ]
机构
[1] KISTI/Dept. of Computing and Networking Resources, Daejeon
[2] Chonnam Nat'l University/School of Electronic and Computer Engineering, Gwangju
[3] Chonbuk Nat'l University/CAIIT, Div. of Electronics and Information Engineering, Jeonju
关键词
Cluster organization; Confidentiality; Energy efficiency; Integrity; Key management; Wireless sensor networks;
D O I
10.4304/jnw.5.3.300-312
中图分类号
学科分类号
摘要
In sensor networks, sensors are likely to be captured by attackers because they are usually deployed in an unprotected or even a hostile environment. If an adversarial compromises a sensor, he/she uses the keys from the compromised sensor to uncover the keys of others sensors. Therefore, it is very important to renew the keys of sensors in a proactive or reactive manner. Even though many group key renewal schemes have been proposed, they have some security flaws. First, they employ a single group key in a cluster so that the compromise of one sensor discloses the group key. Second, they evict the compromised nodes by updating the compromised keys with noncompromised keys. This eviction scheme is useless when the non-compromised keys are exhausted due to the increase of compromised nodes. In this paper, we propose a lightweight key renewal scheme, which evicts the compromised nodes clearly by reforming clusters excluding compromised nodes. Besides, in a cluster, each member employs a pairwise key for communication with its CH (Cluster Head) so that our scheme is tolerable against sensor compromise. Our simulation results prove that the proposed scheme is more tolerable against the compromise of sensors and it is more energy-saving than the group key renewal schemes. © 2010 ACADEMY PUBLISHER.
引用
收藏
页码:300 / 312
页数:12
相关论文
共 18 条
  • [1] Landstra T., Zawodniok M., Jagannathan S., Energy-efficient hybrid key management protocol for wireless sensor networks, Proc. of The 32nd IEEE Conference On Local Computer Networks, pp. 1009-1016, (2007)
  • [2] Zhu S., Setia S., Jajodia S., Leap: Efficient security mechanisms for large-scale distributed sensor networks, Proc. of The 10th Acm Conference On Computer and Communication Security (CCS '03), (2003)
  • [3] Panja B., Madria S., Bhargava B., Energy and comminication efficient group key management protocol for hierarchical sensor network, Proc. of IEEE Int'l Conference On Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06), pp. 384-393, (2006)
  • [4] Perrig A., Szewczyk R., Wen V., Culler D., Tygar J.D., Spins: Security protocols for sensor networks, Wireless Networks, 8, 5, pp. 521-634, (2002)
  • [5] Chan H., Perrig A., Song D., Random key predistribution schemes for distributed sensor networks, Proc. of IEEE Symp. On Security and Privacy, pp. 197-213, (2003)
  • [6] Du W., Deng J., Han Y.S., Chen S., Varshney P., A key management scheme for wireless sensor networks using deployment knowledge, Proc. of IEEE Infocom'04, pp. 586-597, (2004)
  • [7] Liu D., Ning P., Du W., Group-based key predistribution in wireless sensor networks, Proc. of 2005 Acm Workshop On Wireless Security (wise 2005), pp. 11-20, (2005)
  • [8] Traynor P., Choi H., Cao G., Zhu S., Porta T.L., Establishing pair-wise keys in heterogeneous sensor networks, Proc. of IEEE Infocom'06, (2006)
  • [9] Eschenauer L., Gilgor V.D., A key management scheme for distributed sensor networks, Proc. of 9th Acm Conference On Computer and Communication Security, pp. 41-47, (2002)
  • [10] Eltoweissy M., Moharrum M., Mukkamala P., Dynamic key management in sensor networks, IEEE Communications Magazine, 44, 4, pp. 122-130, (2006)