Using Combined Keying Materials for Key Distribution in Wireless Sensor Networks

被引:0
作者
Ergun, Murat [1 ]
Levi, Albert [1 ]
机构
[1] Sabanci Univ, Istanbul, Turkey
来源
2010 IEEE 21ST INTERNATIONAL SYMPOSIUM ON PERSONAL INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC) | 2010年
关键词
key predistribution; probabilistic key management; wireless sensor networks; security;
D O I
10.1109/PIMRC.2010.5671778
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we propose a probabilistic key predistribution scheme for wireless sensor networks that increases connectivity of the basic scheme while keeping sizes of keyring and key pool fixed. We introduce the concept of XORed key, which is the bitwise XOR of two regular (a.k.a. single) keys. Sensor nodes are preloaded with a mixture of single and XORed keys. Nodes establish secure links by using shared XORed keys whenever possible. If node pairs do not have any shared XORed or single keys, they transfer keys from their secure neighbors in a couple of ways, and use them to match with their XORed keys. In this way, the probability of securing links, i.e. local connectivity, increases. The decision of which key is to be transferred from which node is given based on local information at the hand of the nodes. We aim to control the resilience of the network against node capture attacks by using XORed keys since an attacker has to know either both single key operands or the XORed key itself. Simulations show that our scheme is up to 50% more connected as compared to basic scheme. Also it has better resilience performance at the beginning of a node capture attack. When it starts to deteriorate, the difference between the resilience of our proposed scheme and basic scheme is not greater than 5%.
引用
收藏
页码:2603 / 2608
页数:6
相关论文
共 10 条
[1]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[2]  
[Anonymous], 2002, P 9 ACM C COMPUT COM, DOI DOI 10.1145/586110.586117
[3]  
[Anonymous], ACM T INFORM SYSTEM, DOI DOI 10.1145/1053283
[4]  
Camtepe S.A., 2005, TR0507 RENSS POL I C
[5]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[6]  
Du W., 2005, ACM Transactions on Information and Systems Security, V8, P228, DOI 10.1145/1065545.1065548
[7]   A key predistribution scheme for sensor networks using deployment knowledge [J].
Du, WL ;
Deng, J ;
Han, YSS ;
Varshney, PK .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2006, 3 (01) :62-77
[8]   A survey of key management schemes in wireless sensor networks [J].
Xiao, Yang ;
Rayi, Venkata Krishna ;
Sun, Bo ;
Du, Xiaojiang ;
Hu, Fei ;
Galloway, Michael .
COMPUTER COMMUNICATIONS, 2007, 30 (11-12) :2314-2341
[9]   Wireless sensor network key management survey and taxonomy [J].
Zhang, Junqi ;
Varadharajan, Vijay .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2010, 33 (02) :63-75
[10]   SECURING WIRELESS SENSOR NETWORKS: A SURVEY [J].
Zhou, Yun ;
Fang, Yuguang ;
Zhang, Yanchao .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2008, 10 (03) :6-28