A Key Management Based on Multiple Regression in Hierarchical Sensor Network

  • Mihui Kim
  • Inshil Doh
  • Kijoon Chae
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4298)


To lead a present communication paradigm to ubiquitous world, sensor networking is a core technology. Especially guaranteeing secure communication between sensor nodes is critical in hostile environments, and key management is one of the most fundamental security services to achieve it. However, because the structure of sensor networks can be very various according to their application, there can not exist the best solution for all applications. Thus, we design a key management scheme on hierarchical sensor network, to take advantage of the topology. To support both scalability and resilience against node capture, we apply a multiple regression model to key generation, calculation and extension. The proposed scheme is based on the key pre-distribution, but provides the key re-distribution method for key freshness. To overcome the weakness of centralized management, the role of key management is partially distributed to aggregators as well as a sink. These management nodes need not store keys except them for re-distribution, and can calculate them easily using key information from nodes, as needed. Performance results show that the proposed scheme can be applied efficiently in hierarchical sensor network compared with other key managements.


Sensor Network Sensor Node Wireless Sensor Network Message Authentication Code Memory Overhead 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. In: MobiCom 2001, pp. 189–199 (2001)Google Scholar
  2. 2.
    Avancha, S., Undercoffer, J., Joshi, A., Pinkston, J.: Secure sensor networks for perimeter protection. International Journal of Computer and Telecommunications Networking 43(4), 421–435 (2003)zbMATHGoogle Scholar
  3. 3.
    Du, W., Deng, J., Han, Y.S., Varshney, P.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In: 10th ACM Conference on Computer and Communications Security, pp. 42–51. ACM Press, New York (2003)CrossRefGoogle Scholar
  4. 4.
    Liu, D., Ning, P.: Establishing Pairwise Keys in Distributed Sensor Networks. In: CCS’03, pp. 52–61 (2003)Google Scholar
  5. 5.
    Chen, X., Drissi, J.: An Efficient Key Management Scheme in Hierarchical Sensor Networks. In: MASS 2005 (2005)Google Scholar
  6. 6.
    Tubaishat, M., Yin, J., Panja, B., Madria, S.: A Secure Hierarchical Model for Sensor Networ. SIGMOD Record 33(1), 7–13 (2004)CrossRefGoogle Scholar
  7. 7.
    Golberg, M.A.: Introduction to Regression Analysis. WIT Press, Southampton (2004)zbMATHGoogle Scholar
  8. 8.
    Richard, J.D., Mishra, S.: Security Support for In-Network Processing in Wireless Sensor Networks. In: ACM Workshop on the Security of Ad hoc and Sensor Network, pp. 83–93. ACM Press, New York (2003)Google Scholar
  9. 9.
    Bohge, M., Trappe, W.: An Authentication Framework for Hierarchical Ad-hoc Sensor Networks. In: ACM Workshop on Wireless Security, ACM Press, New York (2003)Google Scholar
  10. 10.
    Hou, Y.T., Shi, Y., Sherali, H.D.: Rate Allocation in Wireless Sensor Networks with Network Lifetime Requirement. In: MobiHoc, pp. 67–77 (2004)Google Scholar
  11. 11.
    Ye, F., Luo, H., Cheng, J., Lu, S., Zhang, L.: A Two-tier Data Dissemination Model for Large-scale Wireless Sensor Networks. In: ACM/IEEE Mobicom, IEEE Computer Society Press, Los Alamitos (2002)Google Scholar
  12. 12.
    Intanagonwiwat, C., Govindan, R., Estrin, D., Heidemann, J., Silva, F.: Directed Diffusion for Wireless Sensor Networking. ACM/IEEE Transactions on Networking, 2–16 (2002)Google Scholar
  13. 13.
    Ding, J., Sivalingam, K., Li, B.: Design and Analysis of an Integrated MAC and Routing Protocol Framework for Wireless Sensor Networks. Int. Journal on Ad Hoc & Sensor Wireless Networks (2005)Google Scholar
  14. 14.
  15. 15.
  16. 16.
    Karlof, C., Sastry, N., Wagner, D.: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In: SenSys04’, Nov. (2004)Google Scholar
  17. 17.
    Shnayder, V., Hempstead, M., Chen, B., Welsh, M.: Simulating the Power Consumption of LargeScale Sensor Network Applications. In: SenSys 04’, Nov. (2004)Google Scholar
  18. 18.
    Chan, H., Perrig, A.: PIKE: Peer Intermediaries for Key Establishment. In: INFOCOM 2005 (2005)Google Scholar

Copyright information

© Springer Berlin Heidelberg 2007

Authors and Affiliations

  • Mihui Kim
    • 1
  • Inshil Doh
    • 1
  • Kijoon Chae
    • 1
  1. 1.Dept. of Computer Science and Engineering, Ewha Womans UniversityKorea

Personalised recommendations