Abstract
Wireless Sensor Networks (WSN) have found applications in many areas including healthcare, military and behavior monitoring. However, due to various factors (e.g. use of a wireless channel, deployment in public and unattended areas), WSN applications are vulnerable to various attacks such as impersonation, replay, selective forwarding and sink hole. Therefore, security is an important issue to protect data in WSN. Several symmetric key based security schemes have been proposed in WSN for node authentication and secure data delivery. Most of the schemes are applicable for static WSN, where nodes once deployed, are not allowed to change their locations. However, depending on the application requirements, nodes in WSN may require to move from one place to another. The problem of authenticated pair-wise key update in dynamic WSN has not been addressed adequately in literature. In this paper, we propose a key update protocol which securely updates the session key between a pair of nodes with the help of random inputs in mobile sensor networks. Initially, a unique master key is obtained using symmetric bi-variate polynomial shares. This key is further used in authenticating and establishing the pair-wise key between a pair of nodes. Random inputs from both the participating nodes are used to update the pair-wise key in the mobile WSN setup. The security analysis shows that the proposed protocol resists known-key, impersonation, replay, worm and sink hole attacks. The proposed protocol also provides forward secrecy, key freshness, and mutual key control.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Shi, E., Perrig, A.: Designing Secure Sensor Networks. IEEE Wireless Communications 11(6), 38–43 (2004)
Padmavathi, G., Shanmugapriya, D.: A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks. International Journal of Computer Science and Information Security 4(1&2), 117–125 (2009)
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks Journal 38(4), 393–422 (2002)
Roman, R., Lopez, J., Alcaraz, C., Chen, H.-H.: SenseKey: Simplifying the Selection of Key Management Schemes for Sensor Networks. In: Proceedings of 5th International Symposium on Security and Multimodality in Pervasive Environments, SMPE, pp. 789–794 (2011)
Ren, Y., Oleshchuk, V., Li, F., Ge, X.: Security in Mobile Wireless Sensor Networks - A Survey. Journal of Communications 6(2), 128–142 (2011)
Liu, D., Ning, P.: Establishing pair wise keys in distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 52–61 (2003)
Eschenauer, L., Gligor, V.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47 (2002)
Kim, J., Han, Y., Park, S., Chung, T.: N-Dimensional Grid-Based Key Predistribution in Wireless Sensor Networks. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part II. LNCS, vol. 4706, pp. 1107–1120. Springer, Heidelberg (2007)
Delgosha, F., Fekri, F.: A Multivariate Key-Establishment Scheme for Wireless Sensor Networks. IEEE Transactions on Wireless Communications 8(4), 1814–1824 (2009)
Liao, Y., Lei, C., Wang, A.: A Robust Grid-Based Key Predistribution Scheme for Sensor Networks. In: Proceedings of the Fourth International Conference on Innovative Computing, Information and Control, pp. 760–763 (2009)
Song, G., Leung, V., Zhuzhong, Q.: A Permutation-Based Multi-Polynomial Scheme for Pairwise Key Establishment in Sensor Networks. In: Proceedings of IEEE International Conference on Communications, ICC, pp. 1–5 (2010)
Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory IT-22, 644–654 (1976)
Shim, K.: The Risks of Compromising Secret Information. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol. 2513, pp. 122–133. Springer, Heidelberg (2002)
Lin, X.: CAT: building couples to early detect node compromise attack in wireless sensor networks. In: Proceedings of the 28th IEEE Conference on Global Telecommunications, pp. 2755–2760 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Agrawal, S., Roman, R., Das, M.L., Mathuria, A., Lopez, J. (2012). A Novel Key Update Protocol in Mobile Sensor Networks. In: Venkatakrishnan, V., Goswami, D. (eds) Information Systems Security. ICISS 2012. Lecture Notes in Computer Science, vol 7671. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35130-3_14
Download citation
DOI: https://doi.org/10.1007/978-3-642-35130-3_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35129-7
Online ISBN: 978-3-642-35130-3
eBook Packages: Computer ScienceComputer Science (R0)