SCON: Secure management of continuity in sensor networks

被引:5
作者
Durresi, Arjan [1 ]
Bulusu, Vijay [1 ]
Paruchuri, Vamsi [1 ]
机构
[1] Louisiana State Univ, Dept Comp Sci, Baton Rouge, LA 70803 USA
关键词
key management; deployments; tradeoff security-connectivity-cost; security; sensor networks;
D O I
10.1016/j.comcom.2006.02.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to limited energy capacity of batteries, the function lifetime of sensor networks in general is longer than the operational lifetime of single nodes. Therefore, to keep the network working, multiple deployments of sensor nodes are needed. Due to their nature and their operational resource constraints, sensor networks are vulnerable to various types of attacks. Key pre-distribution has been shown to be an effective way to establish secure communication in sensor networks. However, existing schemes of key pre-distribution assume the use of the same pools in various deployments of sensors. We analyzed the vulnerability of the existing key pre-distribution schemes arising out of the repeated use of fixed key information through multiple deployments. We also developed SCON, an approach for key management that provides a significant improvement in security through the use of a unique key pool for each phase of deployment. Nodes of different deployments connect through special nodes called bridge nodes which have keys from adjacent key pools of respective deployments. Furthermore, we show that SCON can perform better by taking advantage of more powerful nodes used as bridge nodes. (c) 2006 Elsevier B.V. All rights reserved.
引用
收藏
页码:2458 / 2468
页数:11
相关论文
共 21 条
[1]  
Akyildiz I. F., 2004, AD HOC NETW, V2, P351, DOI DOI 10.1016/J.ADH0C.2004.04.003
[2]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[3]  
[Anonymous], 2001, ALGORITHMS COMBIN
[4]  
Carman D.W., 2000, 00010 NAI
[5]  
CHAN H, KEY DISTRIBUTION TEC, P277
[6]   Random key predistribution schemes for sensor networks [J].
Chan, HW ;
Perrig, A ;
Song, D .
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, :197-213
[7]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[8]  
Du WL, 2004, IEEE INFOCOM SER, P586
[9]  
Eschenauer L., 2002, Proceedings of the ACM Conference on Computer and Communications Security, P41, DOI [10.1145/586110.586117, DOI 10.1145/586110.586117]
[10]  
KANNAN R, SECURITY PERFORMANCE