Abstract
Many techniques have been developed recently for establishing pairwise keys in sensor networks. However, they are either vulnerable to a few number of compromised sensor nodes or involve expensive protocols for establishing keys. This paper introduces a much better alternative for achieving high resilience to node compromises and high efficiency in key establishment. The main idea is to deploy additional sensor nodes, called assisting nodes, to help the key establishment between sensor nodes. The proposed approach has many advantages over existing approaches. In this approach, a sensor node only needs to make a few local contacts and perform a few hash operations to setup a key with any other sensor node in the network at a very high probability. The majority of sensor nodes only need to store a single key in their memory space. Besides these benefits, it still provides high resilience to node compromises. The implementation of this approach on TelosB motes also demonstrates its feasibility for pairwise key establishment in sensor networks.
Chapter PDF
Similar content being viewed by others
References
Perrig, A., et al.: SPINS: Security protocols for sensor networks. In: Proceedings of Seventh Annual International Conference on Mobile Computing and Networks (July 2001)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, November 2002, pp. 41–47. ACM Press, New York (2002)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Research in Security and Privacy, pp. 197–213. IEEE Computer Society Press, Los Alamitos (2003)
Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of 10th ACM Conference on Computer and Communications Security (CCS’03), October 2003, pp. 52–61. ACM Press, New York (2003)
Du, W., et al.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of 10th ACM Conference on Computer and Communications Security (CCS’03), October 2003, pp. 42–51. ACM Press, New York (2003)
Chan, H., Perrig, A.: PIKE: Peer intermediaries for key establishment in sensor networks. In: Proceedings of IEEE Infocom, IEEE Computer Society Press, Los Alamitos (2005)
Du, W., et al.: A key management scheme for wireless sensor networks using deployment knowledge. In: Proceedings of IEEE INFOCOM’04, March 2004, IEEE Computer Society Press, Los Alamitos (2004)
Liu, D., Ning, P.: Location-based pairwise key establishments for static sensor networks. In: 2003 ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN ’03), October 2003, pp. 72–82. ACM Press, New York (2003)
Liu, D., Ning, P.: Improving key pre-distribution with deployment knowledge in static sensor networks. ACM Transaction on Sensor Networks (TOSN)Â 1(2) (2005)
Yu, Z., Guan, Y.: A key pre-distribution scheme using deployment knowledge for wireless sensor networks. In: Proceedings of ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), April 2005, IEEE Computer Society Press, Los Alamitos (2005)
Huang, D., et al.: Location-aware key management scheme for wireless sensor networks. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks (SASN ’04), October 2004, pp. 29–42. ACM Press, New York (2004)
Crossbow Technology Inc.: Wireless sensor networks. http://www.xbow.com/Products/Wireless_Sensor_Networks.htm Accessed in February 2006
Akyildiz, I.F., et al.: Wireless sensor networks: A survey. Computer Networks 38(4), 393–422 (2002)
Hartung, C., Balasalle, J., Han, R.: Node compromise in sensor networks: The need for secure systems. Technical Report CU-CS-990-05, U. Colorado at Boulder (Jan. 2005)
Mathur, G., et al.: Ultra-low power data storage for sensor networks. In: Information Processing in Sensor Networks, 2006(IPSN 2006) (April 2006)
Needham, R.M., Schroeder, M.D.: Using encryption for authentication in large networks of computers. Commun. ACM 21(12), 993–999 (1978), doi:10.1145/359657.359659
Hill, J., et al.: System architecture directions for networked sensors. In: Architectural Support for Programming Languages and Operating Systems, pp. 93–104 (2000)
Rivest, R.: The RC5 encryption algorithm. In: Anderson, R. (ed.) FSE 1993. LNCS, vol. 809, pp. 86–96. Springer, Heidelberg (1994)
Liu, D., Ning, P.: Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In: Proceedings of the 10th Annual Network and Distributed System Security Symposium (NDSS’03), February 2003, pp. 263–276 (2003)
Basagni, S., et al.: Secure pebblenets. In: Proceedings of ACM International Symposium on Mobile ad hoc networking and computing, pp. 156–163. ACM Press, New York (2001)
Przydatek, B., Song, D., Perrig, A.: SIA: Secure information aggregation in sensor networks. In: Proceedings of the First ACM Conference on Embedded Networked Sensor Systems (SenSys ’03), Nov. 2003, ACM Press, New York (2003)
Wood, A.D., Stankovic, J.A.: Denial of service in sensor networks. IEEE Computer 35(10), 54–62 (2002)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 IFIP International Federation for Information Processing
About this paper
Cite this paper
Dong, Q., Liu, D. (2007). Using Auxiliary Sensors for Pairwise Key Establishment in WSN. In: Akyildiz, I.F., Sivakumar, R., Ekici, E., Oliveira, J.C.d., McNair, J. (eds) NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet. NETWORKING 2007. Lecture Notes in Computer Science, vol 4479. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72606-7_22
Download citation
DOI: https://doi.org/10.1007/978-3-540-72606-7_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-72605-0
Online ISBN: 978-3-540-72606-7
eBook Packages: Computer ScienceComputer Science (R0)