Abstract
It is not easy to achieve secure key establishment in wireless sensor networks without public key cryptography. Many key management protocols have been proposed for the purpose. Among them, LEAP is a simple and elegant protocol that establishes multi-level keys in an efficient way, but its security mainly relies on that of a single initialization key. Though it is assumed that the initial deployment phase is secure and the key is erased from sensor nodes after the initialization in LEAP, the assumption could not be viable for two reasons. First, the same key should be used again for node addition after the initialization phase whereas the new node can be captured before removing the key. Second, the initial deployment of dense networks may not take short as LEAP expected in many cases. This paper rethinks the security of LEAP and proposes a more secure scheme with a new notion of probabilistic time intervals. Rather we localize the impact of key compromise within the time intervals.
This work was supported by grant No. R01-2006-000-10614-01 and No. R01-2005-000-11261-02 from the Basic Research Program of the Korea Science & Engineering Foundation.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Eschenauer, L., Gligor, V.D.: A Key-management Scheme for Distributed Sensor Networks. In: Proc. of the 9th ACM Conference on Computer and Communication Security (CCS’02), Nov. 2002, pp. 41–47 (2002)
Perrig, A., Stankovic, J., Wagner, D.: Security in Wireless Sensor Networks. Communications of the ACM 47(6), 53–57 (2004)
Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: IEEE Symposium on Research in Security and Privacy, pp. 197–213 (2003)
Du, W., et al.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In: Proceedings of 10th ACM Conference on Computer and Communications Security (CCS’03) (October 2003)
Liu, D., Ning, P.: Establishing Pairwise Keys in Distributed Sensor Networks. In: Proceedings of 10th ACM Conference on Computer and Communications Security(CCS’03), October 2003, pp. 52–61 (2003)
Du, W., et al.: A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge. IEEE Transactions on dependable and secure computing 3(1), 62–77 (2006)
Huang, D., et al.: Location-Aware Key Management Scheme for Wireless Sensor Networks. In: Proc. of ACM Workshop Security of Ad Hoc and Sensor Networks (SASN’04), Oct. 2004, pp. 29–42 (2004)
Lee, J., Kwon, T., Song, J.: Location-aware key management using multi-layer grids for wireless sensor networks. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 390–404. Springer, Heidelberg (2006)
Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In: Proc. of the 10th ACM Conference on Computer and Communication Security (CCS’03), November 2003, pp. 62–72 (2003)
Blom, R.: An Optimal Class of Symmetric Key Generation Systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)
Perrig, A., et al.: SPINS: Security protocols for sensor networks. In: Proc. of the 7th Annual ACM/IEEE International Conference on Mobile Computing and Networking, July 2001, pp. 189–199 (2001)
Hartung, C., Balasalle, J., Han, R.: Node Compromise in Sensor Networks: The Need for Secure Systems. Technical Report CU-CS-990-05, University of Colorado at Boulder (Jan. 2005)
Crossbow Technology, http://www.xbow.com
Karlof, C., Wagner, D.: Secure Routing in Sensor Networks: Attacks and Countermeasures. In: Proc. of the 1st IEEE Workshop on Sensor Network Protocols and Applications (May 2003)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Jang, J., Kwon, T., Song, J. (2007). A Time-Based Key Management Protocol for Wireless Sensor Networks. In: Dawson, E., Wong, D.S. (eds) Information Security Practice and Experience. ISPEC 2007. Lecture Notes in Computer Science, vol 4464. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72163-5_24
Download citation
DOI: https://doi.org/10.1007/978-3-540-72163-5_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-72159-8
Online ISBN: 978-3-540-72163-5
eBook Packages: Computer ScienceComputer Science (R0)