Abstract
In this paper, we propose SeGrid, a secure grid infrastructure for large scale sensor networks. The basic idea relies on the availability of a low-cost public cryptsystem (e.g. Blom’s key management scheme [4]) that can be used for shared key computation between the source and the destination, as long as the public shares are known to each other. In SeGrid, each sensor resides in a grid computed from its physical location. Within a grid, one or a few number of sensors, with one of them the grid head, are active at any instant of time and all other sensors fall asleep for energy conservation. We intend to compute a shared key for two grids instead of two nodes, such that the grid heads can securely communicate with each other. The public shares of a grid are stored at designated locations based on our public share management protocol such that the closer two grids, the shorter distance to obtain each other’s public shares. We instantiate SeGrid based on Blom’s key management scheme [4] to illustrate the computation of a grid key. To our best knowledge, this is the first work that simultaneously considers both key management and network lifetime extension, which explores along the dimension of network density.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
An, F., Cheng, X., Rivera, M., Li, J., Cheng, Z.: PKM: A Pairwise Key Management Scheme for Wireless Sensor Networks. In: Lu, X., Zhao, W. (eds.) ICCNMC 2005. LNCS, vol. 3619, pp. 992–1001. Springer, Heidelberg (2005)
Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, p. 213. Springer, Heidelberg (2001)
Boukerche, A., Cheng, X., Linus, J.: Energy-Aware Data-Centric Routing in Microsensor Networks. In: MSWiM 2003, pp. 42–49 (2003)
Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)
Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: IEEE SP 2003 (2003)
Cheng, X., Thaeler, A., Xue, G., Chen, D.: TPS: a time-based positioning scheme for outdoor sensor networks. In: INFOCOM 2004, HongKong, March 7-11, vol. 4, pp. 2685–2696 (2004)
Ding, M., Chen, D., Xing, K., Cheng, X.: Localized Fault-Tolerant Event Boundary Detection in Sensor Networks. In: IEEE INFOCOM 2005, March 13-17 (2005)
Ding, M., Chen, D., Thaeler, A., Cheng, X.: Fault-Tolerant Target Detection in Sensor Net works. In: IEEE WCNC 2005, March 13-17, vol. 4, pp. 2362–2368 (2005)
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: CCS 2003: Proceedings of the 10th ACM conference on Computer and communications security, pp. 42–51. ACM Press, New York (2003)
Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In: IEEE INFOCOM 2004 (2004)
Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory 22(6), 544–654 (1976)
Eschenauer, L., Gligor, V.D.: A Key-Management Scheme for Distributed Sensor Networks. In: CCS 2002, Washington DC, USA, November 18-22, pp. 41–47 (2002)
Karp, B., Kung, H.T.: GPSR: Greedy Perimeter Stateless Routing for Wireless Networks. In: ACM MOBICOM 2000, pp. 243–254 (2000)
Liu, D., Ning, P.: Establishing Pairwise Keys in Distributed Sensor Networks. In: ACM CCS 2003, pp. 52–60 (2003)
Liu, F., Cheng, X., Hua, D., Chen, D.: TPSS: A Time-based Positioning Scheme for Sensor Networks with Short Range Beacons. In: Lu, X., Zhao, W. (eds.) ICCNMC 2005. LNCS, vol. 3619, pp. 33–42. Springer, Heidelberg (2005)
Liu, F., Ma, L., Cheng, X., Hua, D., Li, J.: S-KMS: A Self-configured Key Management Scheme for Sensor Networks. In: Submitted to IEEE INFOCOM (2006)
Ma, L., Zhang, Q., Cheng, X.: A Power Controlled Interference Aware Routing Protocol for Dense Multi-Hop Wireless Networks (Submitted)
Thaeler, A., Ding, M., Cheng, X.: iTPS: An Improved Location Discovery Scheme for Sensor Networks with Long Range Beacons. Special Issue on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks of Journal of Parallel and Distributed Computing 65(2), 98–106 (2005)
Xu, Y., Heidemann, J., Estrin, D.: Geography-Informed Energy Conservation for Ad Hoc Routing. In: Proceedings of the 7th annual international conference on Mobile computing and networking, Rome, Italy, pp. 70–84 (2001)
Ye, W., Heidemann, J., Estrin, D.: An energy-efficient MAC protocol for wireless sensor networks. In: Proceedings of IEEE INFOCOM, pp. 1567–1576 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
An, F., Cheng, X., Xia, Q., Liu, F., Ma, L. (2005). SeGrid: A Secure Grid Infrastructure for Sensor Networks. In: Jia, X., Wu, J., He, Y. (eds) Mobile Ad-hoc and Sensor Networks. MSN 2005. Lecture Notes in Computer Science, vol 3794. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11599463_42
Download citation
DOI: https://doi.org/10.1007/11599463_42
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30856-0
Online ISBN: 978-3-540-32276-4
eBook Packages: Computer ScienceComputer Science (R0)