A Key Distribution Scheme for Mobile Wireless Sensor Networks: q-s-Composite

被引:45
作者
Gandino, Filippo [1 ]
Ferrero, Renato [1 ]
Rebaudengo, Maurizio [1 ]
机构
[1] Politecn Torino, Dipartimento Automat & Informat, I-10129 Turin, Italy
关键词
Key management; WSN; random predistribution; MANAGEMENT SCHEME; DEPLOYMENT KNOWLEDGE; SYSTEM; PREDISTRIBUTION; INTRUSION; SECURITY;
D O I
10.1109/TIFS.2016.2601061
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The majority of security systems for wireless sensor networks are based on symmetric encryption. The main open issue for these approaches concerns the establishment of symmetric keys. A promising key distribution technique is the random predistribution of secret keys. Despite its effectiveness, this approach presents considerable memory overheads, in contrast with the limited resources of wireless sensor networks. In this paper, an in-depth analytical study is conducted on the state-of-the-art key distribution schemes based on random predistribution. A new protocol, called q-s-composite, is proposed in order to exploit the best features of random predistribution and to improve it with lower requirements. The main novelties of q-s-composite are represented by the organization of the secret material that allows a storing reduction, by the proposed technique for pairwise key generation, and by the limited number of predistributed keys used in the generation of a pairwise key. A comparative analysis demonstrates that the proposed approach provides a higher level of security than the state-of-the-art schemes.
引用
收藏
页码:34 / 47
页数:14
相关论文
共 34 条
  • [21] A Game-Theoretic Framework for Robust Optimal Intrusion Detection in Wireless Sensor Networks
    Moosavi, Hussein
    Bui, Francis Minhthang
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (09) : 1367 - 1379
  • [22] LEDS: Providing location-aware end-to-end data security in wireless sensor networks
    Ren, Kui
    Lou, Wenjing
    Zhang, Yanchao
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (05) : 585 - 598
  • [23] HOCA: Healthcare Aware Optimized Congestion Avoidance and control protocol for wireless sensor networks
    Rezaee, Abbas Ali
    Yaghmaee, Mohammad Hossein
    Rahmani, Amir Masoud
    Mohajerzadeh, Amir Hossein
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 37 : 216 - 228
  • [24] Effective Key Management in Dynamic Wireless Sensor Networks
    Seo, Seung-Hyun
    Won, Jongho
    Sultana, Salmin
    Bertino, Elisa
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (02) : 371 - 383
  • [25] Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks
    Shamshirband, Shahaboddin
    Anuar, Nor Badrul
    Kiah, Miss Laiha Mat
    Rohani, Vala Ali
    Petkovic, Dalibor
    Misra, Sanjay
    Khan, Abdul Nasir
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 42 : 102 - 117
  • [26] A survey on key management mechanisms for distributed Wireless Sensor Networks
    Simplicio, Marcos A., Jr.
    Barreto, Paulo S. L. M.
    Margi, Cintia B.
    Carvalho, Tereza C. M. B.
    [J]. COMPUTER NETWORKS, 2010, 54 (15) : 2591 - 2612
  • [27] Study of ZigBee Wireless Mesh Networks
    Sun, Jing
    Zhang, Xiaofen
    [J]. HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 2, PROCEEDINGS, 2009, : 264 - 267
  • [28] A survey of key management schemes in wireless sensor networks
    Xiao, Yang
    Rayi, Venkata Krishna
    Sun, Bo
    Du, Xiaojiang
    Hu, Fei
    Galloway, Michael
    [J]. COMPUTER COMMUNICATIONS, 2007, 30 (11-12) : 2314 - 2341
  • [29] Location-aware combinatorial key management scheme for clustered sensor networks
    Younis, Mohamed F.
    Ghumman, Kajaldeep
    Eltoweissy, Mohamed
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2006, 17 (08) : 865 - 882
  • [30] Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks
    Yu, Chia-Mu
    Tsou, Yao-Tung
    Lu, Chun-Shien
    Kuo, Sy-Yen
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (05) : 754 - 768