Pairwise and Triple Key Distribution in Wireless Sensor Networks with Applications

被引:54
作者
Ruj, Sushmita [1 ]
Nayak, Amiya [2 ]
Stojmenovic, Ivan [2 ,3 ]
机构
[1] Indian Stat Inst, Kolkata, India
[2] Univ Ottawa, Sch Elect Engn & Comp Sci, Ottawa, ON K1N 6N5, Canada
[3] King Abdulaziz Univ, Jeddah 21413, Saudi Arabia
基金
加拿大自然科学与工程研究理事会;
关键词
Key predistribution; pairwise-keys; resilience; secure-routing; secure-aggregation; Steiner trades; PREDISTRIBUTION; SCHEME; ESTABLISHMENT; DESIGNS;
D O I
10.1109/TC.2012.138
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We address pairwise and (for the first time) triple key establishment problems in wireless sensor networks (WSN). Several types of combinatorial designs have already been applied in key establishment. A BIBD(v, b, r, k, lambda) (or t - (v, b, r, k, lambda) design) can be mapped to a sensor network, where v represents the size of the key pool, b represents the maximum number of nodes that the network can support, and k represents the size of the key chain. Any pair (or t-subset) of keys occurs together uniquely in exactly lambda nodes; lambda = 2 and lambda = 3 are used to establish unique pairwise or triple keys. We use several known constructions of designs with lambda = 2, to predistribute keys in sensors. We also describe a new construction of a design called strong Steiner trade and use it for pairwise key establishment. To the best of our knowledge, this is the first paper on application of trades to key distribution. Our scheme is highly resilient against node capture attacks (achieved by key refreshing) and is applicable for mobile sensor networks (as key distribution is independent on the connectivity graph), while preserving low storage, computation and communication requirements. We introduce a novel concept of triple key distribution, in which three nodes share common keys, and discuss its application in secure forwarding, detecting malicious nodes and key management in clustered sensor networks. We present a polynomial-based and a combinatorial approach (using trades) for triple key distribution. We also extend our construction to simultaneously provide pairwise and triple key distribution scheme, and apply it to secure data aggregation.
引用
收藏
页码:2224 / 2237
页数:14
相关论文
共 51 条
  • [1] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2898, P332
  • [2] Billington EJ, 2003, MATH APPL, V563, P47
  • [3] Blackburn SR, 2008, LECT NOTES COMPUT SC, V5155, P54
  • [4] BLOM R, 1985, LECT NOTES COMPUT SC, V209, P335
  • [5] Blundo C., 1993, Advances in Cryptology - CRYPTO '92. 12th Annual International Cryptology Conference Proceedings, P471
  • [6] Çamtepe SA, 2004, LECT NOTES COMPUT SC, V3193, P293
  • [7] Combinatorial design of key distribution mechanisms for wireless sensor networks
    Camtepe, Seyit A.
    Yener, Bulent
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2007, 15 (02) : 346 - 358
  • [8] Multicast security: A taxonomy and some efficient constructions
    Canetti, R
    Garay, J
    Itkis, G
    Micciancio, D
    Naor, M
    Pinkas, B
    [J]. IEEE INFOCOM '99 - THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS: THE FUTURE IS NOW, 1999, : 708 - 716
  • [9] Chan HW, 2005, IEEE INFOCOM SER, P524
  • [10] Random key predistribution schemes for sensor networks
    Chan, HW
    Perrig, A
    Song, D
    [J]. 2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 197 - 213