Key Pre-distribution Based Secure Backbone Formation in Wireless Sensor Networks

被引:0
作者
Bandara, H. M. N. Dilum [1 ]
Jayasumana, Anura P. [1 ]
Ray, Indrajit [2 ]
机构
[1] Colorado State Univ, Dept Elect & Comp Engn, Ft Collins, CO 80523 USA
[2] Colorado State Univ, Dept Comp Sci, Ft Collins, CO 80523 USA
来源
2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2 | 2008年
关键词
Cluster tree; key pre-distribution; secure sensor networks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security is a prime concern in large-scale wireless sensor networks used for collaborative mission critical applications. A backbone network in the form of a cluster tree can enhance upper layer functions such as routing, broadcasting, in-network query processing and network management. A secure backbone based on the cluster tree enables secure upper layer functions and dynamic distribution of cryptographic keys among different nodes and users of collaborative networks. A secure cluster tree formation algorithm is presented that is independent of key pre-distribution scheme, network topology, and does not require a-priori neighborhood information or location awareness. Simulation based results show that the algorithm retains most of the desirable cluster and cluster tree characteristics while building the secure cluster tree. Availability of neighborhood information further improves the performance. Our simulations also suggest that hierarchical networks are more vulnerable to node capture than non-hierarchical networks.
引用
收藏
页码:769 / +
页数:2
相关论文
共 19 条
  • [1] Bandara H.M.N.D, 2008, THESIS COLORADO STAT
  • [2] Bandara HMND, 2007, ICIIS 2007: SECOND INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS 2007, CONFERENCE PROCEEDINGS, P37
  • [3] CAMTEPE SA, 2003, TR0507 DEP CS RENSS
  • [4] Chakrabarti D., 2006, INT J INF SECUR, V5, P105, DOI DOI 10.1007/S10207-006-0085-4
  • [5] Random key predistribution schemes for sensor networks
    Chan, HW
    Perrig, A
    Song, D
    [J]. 2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 197 - 213
  • [6] Chan HW, 2004, WIRELESS SENSOR NETWORKS, P277
  • [7] Du WL, 2004, IEEE INFOCOM SER, P586
  • [8] A routing-driven key management scheme for Heterogeneous Sensor Networks
    Du, Xiaojiang
    Xiao, Yang
    Ci, Song
    Guizani, Mohsen
    Chen, Hsiao-Hwa
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 3407 - +
  • [9] Eschenauer L., 2002, Proceedings of the ACM Conference on Computer and Communications Security, P41, DOI [10.1145/586110.586117, DOI 10.1145/586110.586117]
  • [10] Heinzelman W., 2002, IEEE Transactions on Wireless Communications '02, V1