Skip to main content

Analysis of Different Key Distribution Schemes for Distributed Sensor Networks

  • Conference paper
Computer Networks and Information Technologies (CNC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 142))

Abstract

DSN is a special network which can provide a useful interface to the real world with their data acquisition and processing capabilities. However, DSN is extremely vulnerable against any type of internal or external attacks, due to resource constraints, lack of tamper-resistant packages, and the nature of its communication channels. Therefore, it is necessary to develop useful security mechanisms which are suitable for DSN. With the recent acceleration in research into secure key distribution, we compare and contrast different key distribution approaches. We aim to identify the distinguish features and weighing up the benefits and drawbacks of each.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Eschenauer, L., Gligor, V.D.: A key management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communication Security, pp. 41–47 (November 2002)

    Google Scholar 

  2. Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, Berkeley, California, pp. 197–213 (May 2003)

    Google Scholar 

  3. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proc. of the 10th ACM conference on Computer and communications security, pp. 42–51 (2003)

    Google Scholar 

  4. Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proc. of the 10th ACM Conference on Computer and Communications Security, CCS 2003 (2003a)

    Google Scholar 

  5. Liu, D., Ning, P.: Improving key predistribution with deployment knowledge in static sensor networks. ACM Trans. Sensor Netw. 1(2), 204–239 (2005)

    Article  Google Scholar 

  6. Chan, H., Perrig, A.: PIKE: Peer Intermediaries for Key Establishment in Sensor Networks. In: IEEE INFOCOM (2005)

    Google Scholar 

  7. Clifford Neuman, B., Ts’o, T.: Kerberos: An Authentication Service for Computer Networks. IEEE Communications 32(9), 33–38 (1994)

    Article  Google Scholar 

  8. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory 22, 644–654 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  9. Rivest, R.L., Shamir, A., Adleman, L.M.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2), 120–126 (1997)

    Article  MathSciNet  MATH  Google Scholar 

  10. Du, W., Deng, J., Shan, Y., Chen, S., Varshney, P.K.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In: INFOCOM 2004, vol. 1, pp. 7–11. IEEE Computer and Communications Societies (2004)

    Google Scholar 

  11. Du, W., et al.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proc. 10th ACM conf. on CCS, Washington, DC, pp. 42–51 (2003)

    Google Scholar 

  12. Perrig, A., Szewczyk, R., et al.: SPINS: Security protocols for sensor networks. ACM Wireless Networks (5), 521–534 (2001)

    Google Scholar 

  13. Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jain, P., Saquib, Z. (2011). Analysis of Different Key Distribution Schemes for Distributed Sensor Networks. In: Das, V.V., Stephen, J., Chaba, Y. (eds) Computer Networks and Information Technologies. CNC 2011. Communications in Computer and Information Science, vol 142. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19542-6_83

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-19542-6_83

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-19541-9

  • Online ISBN: 978-3-642-19542-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics