Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks

被引:26
作者
Choi, Jaewoo [1 ]
Bang, Jihyun [1 ]
Kim, LeeHyung [2 ]
Ahn, Mirim [2 ]
Kwon, Taekyoung [1 ]
机构
[1] Yonsei Univ, Grad Sch Informat, Seoul 120749, South Korea
[2] Agcy Def Dev, Seoul 350600, South Korea
来源
IEEE SYSTEMS JOURNAL | 2017年 / 11卷 / 02期
关键词
Insider threats; key revision process; location-based key management; packet drop attack; wireless sensor network (WSN); PREDISTRIBUTION; AGGREGATION;
D O I
10.1109/JSYST.2015.2422736
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To achieve secure communications in wireless sensor networks (WSNs), sensor nodes (SNs) must establish secret shared keys with neighboring nodes. Moreover, those keys must be updated by defeating the insider threats of corrupted nodes. In this paper, we propose a location-based key management scheme for WSNs, with special considerations of insider threats. After reviewing existing location-based key management schemes and studying their advantages and disadvantages, we selected location-dependent key management (LDK) as a suitable scheme for our study. To solve a communication interference problem in LDK and similar methods, we have devised a new key revision process that incorporates grid-based location information. We also propose a key establishment process using grid information. Furthermore, we construct key update and revocation processes to effectively resist inside attackers. For analysis, we conducted a rigorous simulation and confirmed that our method can increase connectivity while decreasing the compromise ratio when the minimum number of common keys required for key establishment is high. When there was a corrupted node leveraging insider threats, it was also possible to effectively rekey every SN except for the corrupted node using our method. Finally, the hexagonal deployment of anchor nodes could reduce network costs.
引用
收藏
页码:494 / 502
页数:9
相关论文
共 25 条
[1]   Dynamic and secure key management model for hierarchical heterogeneous sensor networks [J].
Alagheband, M. R. ;
Aref, M. R. .
IET INFORMATION SECURITY, 2012, 6 (04) :271-280
[2]  
Anjum F., 2006, Proc. 5th ACM workshop on Wireless Security, Los Angeles, P21, DOI DOI 10.1145/1161289.1161293
[3]   Location dependent key management in sensor networks without using deployment knowledge [J].
Anjum, Farooq .
WIRELESS NETWORKS, 2010, 16 (06) :1587-1600
[4]  
[Anonymous], 2004, P 23 ANN JOINT C IEE
[5]   IKM -- An identity based key management scheme for heterogeneous sensor networks [J].
Boujelben M. ;
Youssef H. ;
Mzid R. ;
Abid M. .
Journal of Communications, 2011, 6 (02) :185-197
[6]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[7]   Distributed First Stage Detection for Node Capture [J].
Ding, Wei ;
Yu, Yingbing ;
Yenduri, Sumanth .
2010 IEEE GLOBECOM WORKSHOPS, 2010, :1566-1570
[8]  
Donggang Liu, 2005, ACM Transactions on Information and Systems Security, V8, P41, DOI 10.1145/1053283.1053287
[9]  
Du W., 2005, ACM Transactions on Information and Systems Security, V8, P228, DOI 10.1145/1065545.1065548
[10]  
Eschenauer L., 2002, ACM CCS2002, DOI DOI 10.1145/586110.586117