Abstract
Wireless Sensor Networks (WSNs) are formed by a set of small devices, called nodes, with limited computing power, storage space, and wireless communication capabilities. Most of these sensor nodes are deployed within a specific area to collect data or monitor a physical phenomenon. Data collected by each sensor node needs to be delivered and integrated to derive the whole picture of sensing phenomenon. To deliver data without being compromised, WSN services rely on secure communication and efficient key distribution. In this paper, we proposed two key distribution schemes for WSNs, which require less memory than existing schemes for the storage of keys. The Adaptive Random Pre-distributed scheme (ARP) is able to authenticate group membership and minimize the storage requirement for the resource limited sensor nodes. The Uniquely Assigned One-way Hash Function scheme (UAO) extends ARP to mutually authenticate the identity of individual sensors. The two proposed schemes are effective for the storage of keys in a wireless sensor network with a large number of sensors.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. (2002). A Survey on Sensor Networks. In IEEE Communications Magazine, pages 102–114, August.
D. Estrin, R. Govindan, J. Heidemann and S. Kumar. (1999). Next Century Challenges: Scalable Coordination in Sensor Networks, In Proceedings of the Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking, August.
S. Slijepcevic, M. Potkonjak, V. Tsiatsis, S. Zimbeck, and M. B. Srivastava. (2002). On communication security in wireless ad-hoc sensor network, Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure fbr Collaborative Enterprises (WETICE'02), June.
S. Tilak, N. Abu-Ghazaleh, and W. Heinzelman. (2002). A taxonomy of wireless microsensor network models, A CM Mobile Computing and Communications Review (MC2R 2002).
Hodjat and I. Verbauwhede. (2002). The energy cost of secrets in ad-hoc networks, IEEE CAS Workshop on Wireless Communications and Networking, September.
T. He, J. A. Stankovic, C. Lu, and T. F. Abdelzaher. (2003). Speed: A stateless protocol for real-time communication in sensor networks, In International Conference on Distributed Computing Systems (ICDCS 2003), May.
W. Heinzelman, A. Chandrakasan, and H. Balakrishnan. (2000). Energy efficient communication protocols for wireless microsensor networks, Proc. Hawaaian Int'l Conf. on Systems Science, January.
W. Heinzelman, J. Kulik, and H. Balakrishnan. (1999). Adaptive protocols for information dissemination in wireless sensor networks, In Proceedings of the Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking, August.
C. Intanagonwiwat, R. Govindan, and D. Estrin. (2000). Directed diffusion: A scalable and robust communication paradigm for sensor networks, In Proceedings of the Sixth Annual International Conference on Mobile Computing and Networks (MobiCOM '00), August 2000.
L. Zhou and Z. J. Haas. (1999) Securing ad hoc networks, IEEE Networks Magazine, vol. 13, no. 6, pages 24–30, November.
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. (2001). Providing robust and ubiquitous security support for mobil ad-hoc network, Network Protocols Ninth International Conference on ICNP 2001.
H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang. (2002). Self-securing ad hoc wireless networks, In Proceedings of Seventh International Symposium on Computers and Communications (ISCC 2002), pages 567–574.
J.-P. Hubaux, L. Buttyan, and S. Capkun. (2001). The quest for security in mobile ad hoc networks, In Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing, October.
N. Asokan and P. Ginzborg. (2000). in ad hoc networks, Computer Communications, vol. 23, pages 1627–1637.
S. Yi and R. Kravets. (2003). Moca: Mobile certificate authority for wireless ad hoc networks, 2nd Annual PKI Research Workshop Program (PKIO03), April.
Seung Yi and Robin Kravets. (2002) Key management for heterogeneous ad hoc wireless networks, The 10th IEEE International Conference on Network Protocols (ICNP2002).
S. Basagni, K. Herrin, E. Rosti, D. Bruschi, and E. Rosti. (2001). Secure pebblenets, In Proceedings of the 2001 A CM International Symposium on Mobile Ad Hoc Networking and Computing, pages 156–163.
D. W. Carman, P. S. Kruus, and B. J. Matt. (2000). Constraints and approaches for distributed sensor network security, NAI Labs Technical Report #00-010, September.
D. W. Carman, B. J. Matt, and G. H. Cirincione. (2002). Energy-efficient and low-latency key management for sensor networks, In Proceedings of 23rd Army Science Conference, December 2002.
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, Spins: Security protocols for sensor networks, In Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking, July.
D. Liu and P. Ning. (2003). Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks, The 10th Annual Network and Distributed System Security Symposium, February.
J. Undercoffer, S. Avancha, A. Joshi, and J. Pinkston. (2002). Security for sensor networks, 2002 CADIP Research Symposium.
L. Eschenauer and V. D. Gligor. (2002). A key-management scheme for distributed sensor networks, In Proceedings of the 9th ACM Conference on Computer and Communication Security, pages 41–47, November.
H. Chan, A. Perrig, and D. Song. (2003). Random key predistribution schemes for sensor networks, IEEE Symposium on Security and Privacy, May.
P. Erdõs and A. Renyi. (1960). On the evolution of random graphs, Publ. Math. Inst. Hungat. Acad. Sci., vol. 5, pages 17–6.
J. Spencer. (2000). The Strange Logic of Random Graphs. Springer-Verlag.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer Science+Business Media, Inc.
About this chapter
Cite this chapter
Huang, SI., Shieh, S., Wu, S. (2005). Adaptive Random Key Distribution Schemes for Wireless Sensor Networks. In: Lee, D.T., Shieh, S.P., Tygar, J.D. (eds) Computer Security in the 21st Century. Springer, Boston, MA. https://doi.org/10.1007/0-387-24006-3_7
Download citation
DOI: https://doi.org/10.1007/0-387-24006-3_7
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-24005-3
Online ISBN: 978-0-387-24006-0
eBook Packages: Computer ScienceComputer Science (R0)