Skip to main content

Key Establishment Using Group Information for Wireless Sensor Networks

  • Conference paper
Sensor Systems and Software (S-CUBE 2009)

Abstract

Wireless sensor networks are commonly used for critical security tasks such as intrusion or tamper detection, and therefore must be protected. To date, security of these networks relies mostly on key establishment and routing protocols. We present a new approach to key establishment, which combines a group-based distribution model and identity-based cryptography. Using this solution enables sensor nodes to authenticate each other, and provides them with a structure to build secure communications between one another, and between various groups. Using our key establishment protocol, we show how to reduce or prevent significant attacks on wireless sensor networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Du, W., Deng, J., Han, Y., Chen, S., Varshney, P.: A key management scheme for wireless sensor networks using deployment knowledge. In: INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies, vol. 1, p. 597 (2004)

    Google Scholar 

  2. Huang, D., Mehta, M., Medhi, D., Harn, L.: Location-aware key management scheme for wireless sensor networks. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 29–42. ACM, Washington (2004)

    Chapter  Google Scholar 

  3. Liu, D., Ning, P.: Location-based pairwise key establishments for static sensor networks. In: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pp. 72–82. ACM, Fairfax (2003)

    Chapter  Google Scholar 

  4. Yu, Z., Guan, Y.: A key management scheme using deployment knowledge for wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems 19(10), 1411–1425 (2008)

    Article  Google Scholar 

  5. Gaubatz, G., Kaps, J., Sunar, B.: Public key cryptography in sensor Networks – Revisited. In: The Proceedings of the 1st European Workshop on Security in Ad-Hoc and Sensor Networks, ESAS (2005)

    Google Scholar 

  6. Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119–132. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  7. Malan, D., Welsh, M., Smith, M.: A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, IEEE SECON 2004, pp. 71–80 (2004)

    Google Scholar 

  8. Wander, A.S., Gura, N., Eberle, H., Gupta, V., Shantz, S.C.: Energy analysis of Public-Key cryptography for wireless sensor networks. In: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications, pp. 324–328. IEEE Computer Society, Los Alamitos (2005)

    Chapter  Google Scholar 

  9. Watro, R., Kong, D., fen Cuti, S., Gardiner, C., Lynn, C., Kruus, P.: TinyPK: securing sensor networks with public key technology. In: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pp. 59–64. ACM, Washington (2004)

    Chapter  Google Scholar 

  10. Zhou, Y., Zhang, Y., Fang, Y.: Access control in wireless sensor networks. Ad Hoc Networks 5(1), 3–13 (2007)

    Article  Google Scholar 

  11. Zhang, Y., Liu, W., Lou, W., Fang, Y.: Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE Journal on Selected Areas in Communications 24(2), 247–260 (2006)

    Article  Google Scholar 

  12. Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing, pp. 213–229 (2001)

    Google Scholar 

  13. Scott, M., Costigan, N., Abdulwahab, W.: Implementing cryptographic pairings on smartcards. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 134–147. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  14. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  15. Liu, D., Ning, P., Du, W.: Group-based key predistribution for wireless sensor networks. ACM Trans. Sen. Netw. 4(2), 1–30 (2008)

    Article  Google Scholar 

  16. Parno, B., Perrig, A., Gligor, V.: Distributed detection of node replication attacks in sensor networks. In: SP 2005: Proceedings of the 2005 IEEE Symposium on Security and Privacy, pp. 49–63. IEEE Computer Society, Washington (2005)

    Google Scholar 

  17. Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: Proceedings of the 10th ACM conference on Computer and communications security, pp. 62–72. ACM, Washington (2003)

    Chapter  Google Scholar 

  18. Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  19. Hu, Y.-C., Perrig, A., Johnson, D.: Packet leashes: a defense against wormhole attacks in wireless networks. In: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2003, vol. 3, pp. 1976–1986. IEEE, Los Alamitos (2003)

    Google Scholar 

  20. Lazos, L., Poovendran, R., Meadows, C., Syverson, P., Chang, L.: Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach. In: Wireless Communications and Networking Conference, vol. 2, pp. 1193–1199. IEEE, Los Alamitos (2005)

    Google Scholar 

  21. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  22. Amtel Corporation, Amtel ATmega128 (2009), http://www.atmel.com/dyn/products/product_card.asp?part_id=2018

  23. Crossbow Technology, iMote2 (2009), http://www.xbow.com/Products/Product_pdf_files/Wireless_pdf/Imote2_Datasheet.pdf

  24. Oliveira, L., Aranha, D., Morais, E., Daguano, F., Lopez, J., Dahab, R.: Tinytate: Computing the tate pairing in resource-constrained sensor nodes. In: Sixth IEEE International Symposium on Network Computing and Applications, NCA 2007, pp. 318–323 (2007)

    Google Scholar 

  25. Texas Instruments, CC2420 (2008), http://focus.ti.com/lit/ds/symlink/cc2420.pdf

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Claycomb, W.R., Lopes, R., Shin, D., Kim, B. (2010). Key Establishment Using Group Information for Wireless Sensor Networks. In: Hailes, S., Sicari, S., Roussos, G. (eds) Sensor Systems and Software. S-CUBE 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 24. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11528-8_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-11528-8_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-11527-1

  • Online ISBN: 978-3-642-11528-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics