A Key Distribution Scheme for Mobile Wireless Sensor Networks: q-s-Composite

被引:47
作者
Gandino, Filippo [1 ]
Ferrero, Renato [1 ]
Rebaudengo, Maurizio [1 ]
机构
[1] Politecn Torino, Dipartimento Automat & Informat, I-10129 Turin, Italy
关键词
Key management; WSN; random predistribution; MANAGEMENT SCHEME; DEPLOYMENT KNOWLEDGE; SYSTEM; PREDISTRIBUTION; INTRUSION; SECURITY;
D O I
10.1109/TIFS.2016.2601061
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The majority of security systems for wireless sensor networks are based on symmetric encryption. The main open issue for these approaches concerns the establishment of symmetric keys. A promising key distribution technique is the random predistribution of secret keys. Despite its effectiveness, this approach presents considerable memory overheads, in contrast with the limited resources of wireless sensor networks. In this paper, an in-depth analytical study is conducted on the state-of-the-art key distribution schemes based on random predistribution. A new protocol, called q-s-composite, is proposed in order to exploit the best features of random predistribution and to improve it with lower requirements. The main novelties of q-s-composite are represented by the organization of the secret material that allows a storing reduction, by the proposed technique for pairwise key generation, and by the limited number of predistributed keys used in the generation of a pairwise key. A comparative analysis demonstrates that the proposed approach provides a higher level of security than the state-of-the-art schemes.
引用
收藏
页码:34 / 47
页数:14
相关论文
共 34 条
[21]   A Game-Theoretic Framework for Robust Optimal Intrusion Detection in Wireless Sensor Networks [J].
Moosavi, Hussein ;
Bui, Francis Minhthang .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (09) :1367-1379
[22]   LEDS: Providing location-aware end-to-end data security in wireless sensor networks [J].
Ren, Kui ;
Lou, Wenjing ;
Zhang, Yanchao .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (05) :585-598
[23]   HOCA: Healthcare Aware Optimized Congestion Avoidance and control protocol for wireless sensor networks [J].
Rezaee, Abbas Ali ;
Yaghmaee, Mohammad Hossein ;
Rahmani, Amir Masoud ;
Mohajerzadeh, Amir Hossein .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 37 :216-228
[24]   Effective Key Management in Dynamic Wireless Sensor Networks [J].
Seo, Seung-Hyun ;
Won, Jongho ;
Sultana, Salmin ;
Bertino, Elisa .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (02) :371-383
[25]   Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks [J].
Shamshirband, Shahaboddin ;
Anuar, Nor Badrul ;
Kiah, Miss Laiha Mat ;
Rohani, Vala Ali ;
Petkovic, Dalibor ;
Misra, Sanjay ;
Khan, Abdul Nasir .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 42 :102-117
[26]   A survey on key management mechanisms for distributed Wireless Sensor Networks [J].
Simplicio, Marcos A., Jr. ;
Barreto, Paulo S. L. M. ;
Margi, Cintia B. ;
Carvalho, Tereza C. M. B. .
COMPUTER NETWORKS, 2010, 54 (15) :2591-2612
[27]   Study of ZigBee Wireless Mesh Networks [J].
Sun, Jing ;
Zhang, Xiaofen .
HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 2, PROCEEDINGS, 2009, :264-267
[28]   A survey of key management schemes in wireless sensor networks [J].
Xiao, Yang ;
Rayi, Venkata Krishna ;
Sun, Bo ;
Du, Xiaojiang ;
Hu, Fei ;
Galloway, Michael .
COMPUTER COMMUNICATIONS, 2007, 30 (11-12) :2314-2341
[29]   Location-aware combinatorial key management scheme for clustered sensor networks [J].
Younis, Mohamed F. ;
Ghumman, Kajaldeep ;
Eltoweissy, Mohamed .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2006, 17 (08) :865-882
[30]   Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks [J].
Yu, Chia-Mu ;
Tsou, Yao-Tung ;
Lu, Chun-Shien ;
Kuo, Sy-Yen .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (05) :754-768