Skip to main content

A Novel Key Update Protocol in Mobile Sensor Networks

  • Conference paper
Information Systems Security (ICISS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7671))

Included in the following conference series:

Abstract

Wireless Sensor Networks (WSN) have found applications in many areas including healthcare, military and behavior monitoring. However, due to various factors (e.g. use of a wireless channel, deployment in public and unattended areas), WSN applications are vulnerable to various attacks such as impersonation, replay, selective forwarding and sink hole. Therefore, security is an important issue to protect data in WSN. Several symmetric key based security schemes have been proposed in WSN for node authentication and secure data delivery. Most of the schemes are applicable for static WSN, where nodes once deployed, are not allowed to change their locations. However, depending on the application requirements, nodes in WSN may require to move from one place to another. The problem of authenticated pair-wise key update in dynamic WSN has not been addressed adequately in literature. In this paper, we propose a key update protocol which securely updates the session key between a pair of nodes with the help of random inputs in mobile sensor networks. Initially, a unique master key is obtained using symmetric bi-variate polynomial shares. This key is further used in authenticating and establishing the pair-wise key between a pair of nodes. Random inputs from both the participating nodes are used to update the pair-wise key in the mobile WSN setup. The security analysis shows that the proposed protocol resists known-key, impersonation, replay, worm and sink hole attacks. The proposed protocol also provides forward secrecy, key freshness, and mutual key control.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Shi, E., Perrig, A.: Designing Secure Sensor Networks. IEEE Wireless Communications 11(6), 38–43 (2004)

    Article  Google Scholar 

  2. Padmavathi, G., Shanmugapriya, D.: A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks. International Journal of Computer Science and Information Security 4(1&2), 117–125 (2009)

    Google Scholar 

  3. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks Journal 38(4), 393–422 (2002)

    Article  Google Scholar 

  4. Roman, R., Lopez, J., Alcaraz, C., Chen, H.-H.: SenseKey: Simplifying the Selection of Key Management Schemes for Sensor Networks. In: Proceedings of 5th International Symposium on Security and Multimodality in Pervasive Environments, SMPE, pp. 789–794 (2011)

    Google Scholar 

  5. Ren, Y., Oleshchuk, V., Li, F., Ge, X.: Security in Mobile Wireless Sensor Networks - A Survey. Journal of Communications 6(2), 128–142 (2011)

    Article  Google Scholar 

  6. Liu, D., Ning, P.: Establishing pair wise keys in distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, pp. 52–61 (2003)

    Google Scholar 

  7. Eschenauer, L., Gligor, V.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41–47 (2002)

    Google Scholar 

  8. Kim, J., Han, Y., Park, S., Chung, T.: N-Dimensional Grid-Based Key Predistribution in Wireless Sensor Networks. In: Gervasi, O., Gavrilova, M.L. (eds.) ICCSA 2007, Part II. LNCS, vol. 4706, pp. 1107–1120. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  9. Delgosha, F., Fekri, F.: A Multivariate Key-Establishment Scheme for Wireless Sensor Networks. IEEE Transactions on Wireless Communications 8(4), 1814–1824 (2009)

    Article  Google Scholar 

  10. Liao, Y., Lei, C., Wang, A.: A Robust Grid-Based Key Predistribution Scheme for Sensor Networks. In: Proceedings of the Fourth International Conference on Innovative Computing, Information and Control, pp. 760–763 (2009)

    Google Scholar 

  11. Song, G., Leung, V., Zhuzhong, Q.: A Permutation-Based Multi-Polynomial Scheme for Pairwise Key Establishment in Sensor Networks. In: Proceedings of IEEE International Conference on Communications, ICC, pp. 1–5 (2010)

    Google Scholar 

  12. Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory IT-22, 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  13. Shim, K.: The Risks of Compromising Secret Information. In: Deng, R.H., Qing, S., Bao, F., Zhou, J. (eds.) ICICS 2002. LNCS, vol. 2513, pp. 122–133. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  14. Lin, X.: CAT: building couples to early detect node compromise attack in wireless sensor networks. In: Proceedings of the 28th IEEE Conference on Global Telecommunications, pp. 2755–2760 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Agrawal, S., Roman, R., Das, M.L., Mathuria, A., Lopez, J. (2012). A Novel Key Update Protocol in Mobile Sensor Networks. In: Venkatakrishnan, V., Goswami, D. (eds) Information Systems Security. ICISS 2012. Lecture Notes in Computer Science, vol 7671. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35130-3_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35130-3_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35129-7

  • Online ISBN: 978-3-642-35130-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics