Abstract
DSN is a special network which can provide a useful interface to the real world with their data acquisition and processing capabilities. However, DSN is extremely vulnerable against any type of internal or external attacks, due to resource constraints, lack of tamper-resistant packages, and the nature of its communication channels. Therefore, it is necessary to develop useful security mechanisms which are suitable for DSN. With the recent acceleration in research into secure key distribution, we compare and contrast different key distribution approaches. We aim to identify the distinguish features and weighing up the benefits and drawbacks of each.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Eschenauer, L., Gligor, V.D.: A key management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communication Security, pp. 41–47 (November 2002)
Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, Berkeley, California, pp. 197–213 (May 2003)
Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proc. of the 10th ACM conference on Computer and communications security, pp. 42–51 (2003)
Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proc. of the 10th ACM Conference on Computer and Communications Security, CCS 2003 (2003a)
Liu, D., Ning, P.: Improving key predistribution with deployment knowledge in static sensor networks. ACM Trans. Sensor Netw. 1(2), 204–239 (2005)
Chan, H., Perrig, A.: PIKE: Peer Intermediaries for Key Establishment in Sensor Networks. In: IEEE INFOCOM (2005)
Clifford Neuman, B., Ts’o, T.: Kerberos: An Authentication Service for Computer Networks. IEEE Communications 32(9), 33–38 (1994)
Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory 22, 644–654 (1976)
Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1997)
Du, W., Deng, J., Shan, Y., Chen, S., Varshney, P.K.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In: INFOCOM 2004, vol. 1, pp. 7–11. IEEE Computer and Communications Societies (2004)
Du, W., et al.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proc. 10th ACM conf. on CCS, Washington, DC, pp. 42–51 (2003)
Perrig, A., Szewczyk, R., et al.: SPINS: Security protocols for sensor networks. ACM Wireless Networks (5), 521–534 (2001)
Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jain, P., Saquib, Z. (2011). Analysis of Different Key Distribution Schemes for Distributed Sensor Networks. In: Das, V.V., Stephen, J., Chaba, Y. (eds) Computer Networks and Information Technologies. CNC 2011. Communications in Computer and Information Science, vol 142. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19542-6_83
Download citation
DOI: https://doi.org/10.1007/978-3-642-19542-6_83
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-19541-9
Online ISBN: 978-3-642-19542-6
eBook Packages: Computer ScienceComputer Science (R0)