Skip to main content

A Time-Based Key Management Protocol for Wireless Sensor Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4464))

Abstract

It is not easy to achieve secure key establishment in wireless sensor networks without public key cryptography. Many key management protocols have been proposed for the purpose. Among them, LEAP is a simple and elegant protocol that establishes multi-level keys in an efficient way, but its security mainly relies on that of a single initialization key. Though it is assumed that the initial deployment phase is secure and the key is erased from sensor nodes after the initialization in LEAP, the assumption could not be viable for two reasons. First, the same key should be used again for node addition after the initialization phase whereas the new node can be captured before removing the key. Second, the initial deployment of dense networks may not take short as LEAP expected in many cases. This paper rethinks the security of LEAP and proposes a more secure scheme with a new notion of probabilistic time intervals. Rather we localize the impact of key compromise within the time intervals.

This work was supported by grant No. R01-2006-000-10614-01 and No. R01-2005-000-11261-02 from the Basic Research Program of the Korea Science & Engineering Foundation.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Eschenauer, L., Gligor, V.D.: A Key-management Scheme for Distributed Sensor Networks. In: Proc. of the 9th ACM Conference on Computer and Communication Security (CCS’02), Nov. 2002, pp. 41–47 (2002)

    Google Scholar 

  2. Perrig, A., Stankovic, J., Wagner, D.: Security in Wireless Sensor Networks. Communications of the ACM 47(6), 53–57 (2004)

    Article  Google Scholar 

  3. Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: IEEE Symposium on Research in Security and Privacy, pp. 197–213 (2003)

    Google Scholar 

  4. Du, W., et al.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks. In: Proceedings of 10th ACM Conference on Computer and Communications Security (CCS’03) (October 2003)

    Google Scholar 

  5. Liu, D., Ning, P.: Establishing Pairwise Keys in Distributed Sensor Networks. In: Proceedings of 10th ACM Conference on Computer and Communications Security(CCS’03), October 2003, pp. 52–61 (2003)

    Google Scholar 

  6. Du, W., et al.: A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge. IEEE Transactions on dependable and secure computing 3(1), 62–77 (2006)

    Article  Google Scholar 

  7. Huang, D., et al.: Location-Aware Key Management Scheme for Wireless Sensor Networks. In: Proc. of ACM Workshop Security of Ad Hoc and Sensor Networks (SASN’04), Oct. 2004, pp. 29–42 (2004)

    Google Scholar 

  8. Lee, J., Kwon, T., Song, J.: Location-aware key management using multi-layer grids for wireless sensor networks. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 390–404. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  9. Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In: Proc. of the 10th ACM Conference on Computer and Communication Security (CCS’03), November 2003, pp. 62–72 (2003)

    Google Scholar 

  10. Blom, R.: An Optimal Class of Symmetric Key Generation Systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  11. Perrig, A., et al.: SPINS: Security protocols for sensor networks. In: Proc. of the 7th Annual ACM/IEEE International Conference on Mobile Computing and Networking, July 2001, pp. 189–199 (2001)

    Google Scholar 

  12. Hartung, C., Balasalle, J., Han, R.: Node Compromise in Sensor Networks: The Need for Secure Systems. Technical Report CU-CS-990-05, University of Colorado at Boulder (Jan. 2005)

    Google Scholar 

  13. Crossbow Technology, http://www.xbow.com

  14. Karlof, C., Wagner, D.: Secure Routing in Sensor Networks: Attacks and Countermeasures. In: Proc. of the 1st IEEE Workshop on Sensor Network Protocols and Applications (May 2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ed Dawson Duncan S. Wong

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Jang, J., Kwon, T., Song, J. (2007). A Time-Based Key Management Protocol for Wireless Sensor Networks. In: Dawson, E., Wong, D.S. (eds) Information Security Practice and Experience. ISPEC 2007. Lecture Notes in Computer Science, vol 4464. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72163-5_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72163-5_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72159-8

  • Online ISBN: 978-3-540-72163-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics