Skip to main content

LPKM: A Lightweight Polynomial-Based Key Management Protocol for Distributed Wireless Sensor Networks

  • Conference paper
Ad Hoc Networks (ADHOCNETS 2012)

Abstract

Due to the critical resource constraints of wireless sensor nodes such as processing speed, memory size and energy supply, implementing security mechanisms, in particular key management schemes, is quite challenging. Motivated by the conference key establishment scheme proposed by Harn and Gong in [11], we propose LPKM (Lightweight Polynomial-based Key Management Protocol), a key management scheme for distributed WSNs. LPKM enables sensor nodes to establish different types of keys to bootstrap trust and secure one-to-one and one-to-many communications in a flexible, reliable, and non-interactive way. Moreover, LPKM can effectively mitigate or thwart the most common attacks to WSNs such as node clone attacks, node impersonation attacks, etc. In addition, LPKM can tolerate changes of network topology and incurs little computational and communication overhead. Our experimental results on MICAz motes show that LPKM can be efficiently implemented on low-cost sensor nodes. In particular, a MICAz mote running at a frequency of 8MHz can generate required group keys of 128-bit in a few milliseconds, at a cost of 6.12 KBytes ROM and 68 Bytes RAM.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Albrecht, M., Gentry, C., Halevi, S., Katz, J.: Attacking Cryptographic Schemes Based on “Perturbation Polynomials”. In: The 16th ACM Conference on Computer and Communication Security - CCS 2009, pp. 1–10. ACM Press (2009)

    Google Scholar 

  2. Balenson, D., McGrew, D., Sherman, A.: Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization. In: IETF Internet Draft (August 2000), http://tools.ietf.org/html/draft-irtf-smug-groupkeymgmt-oft-00

  3. Bellare, M., Kilian, J., Rogaway, P.: The Security of the Cipher Block Chaining Message Authentication Code. Journal of Computer and System Sciences 61(3), 362–399 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  4. Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-Secure Key Distribution for Dynamic Conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)

    Chapter  Google Scholar 

  5. Chan, H., Perrig, A.: Security and Privacy in Sensor Networks. IEEE Computer Magazine 36(10), 103–105 (2003)

    Article  Google Scholar 

  6. Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: The 2003 IEEE Symposium on Security and Privacy - S&P 2003, pp. 197–213. IEEE Computer Society (2003)

    Google Scholar 

  7. Crossbow Technology Inc., MICAz – Wireless Measurement System, http://bullseye.xbow.com:81/Products/Product_pdf_files/Wireless_pdf/MICAz_Datasheet.pdf .

  8. Du, W., Deng, J., Han, Y., Varshney, P.: A Pairwise Key Pre-Distribution Schemes for Wireless Sensor Networks. In: The 10th ACM Conference on Computer and Communication Security - CCS 2003, pp. 42–51. ACM Press (2003)

    Google Scholar 

  9. Du, X., Guizani, G., Xiao, Y., Chen, H.-H.: A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks. IEEE Transactions on Wireless Communications 8(3), 1223–1229 (2009)

    Article  Google Scholar 

  10. Eschenauer, L., Gligor, V.: A Key-Management Scheme for Distributed Sensor Networks. In: The 9th ACM Conference on Computer and Communication Security - CCS 2002, pp. 41–47. ACM Press (2002)

    Google Scholar 

  11. Harn, L., Gong, G.: Conference Key Establishment Using Polynomials, Centre for Applied Cryptographic Research (CACR). Technical Reports, CACR 2012-10, http://cacr.uwaterloo.ca/techreports/2012/cacr2012-10.pdf , 2012.

  12. Hung, H., Muckenhirn, C., Rivers, T.: Group Key Management Protocol (GKMP) Architecture, Request for Comments (RFC 2094), Internet Engineering Task Force (July 1997), http://tools.ietf.org/html/rfc2094

  13. IEEE Standard 802.15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specification for Low-Rate Wireless Personal Area Networks (WPANs). IEEE Computer Soceity (June 2006)

    Google Scholar 

  14. Liu, D., Ning, P.: Establishing Pairwise Keys in Distributed Sensor Netowrks. In: The 10th ACM Conference on Computer and Communication Security - CCS 2003, pp. 52–61. ACM Press (2003)

    Google Scholar 

  15. Liu, D., Ning, P.: Security for Wireless Sensor Networks. Advances in Information Security Series. Springer (2006)

    Google Scholar 

  16. López, J., Zhou, J.: Wireless Sensor Network Security. Cryptology and Information Security Series. IOS Press (2008)

    Google Scholar 

  17. Malan, D., Welsh, M., Smith, M.D.: Implementing Public-Key Infrastructure for Sensor Networks. ACM Transactions on Sensor Networks 4(4), Article No: 22 (2008)

    Google Scholar 

  18. Mandal, K., Fan, X., Gong, G.: A Light weight Pseudorandom Number Generator for EPC Class 1 Gen 2 RFID Tags. In: West European Workshop on Research in Cryptography - WEWoRC 2011, Conference Record, pp. 91–95 (2011)

    Google Scholar 

  19. Parno, B., Perrig, A., Gligor, V.: Distributed Detection of Node Replication Attacks in Sensor Networks. In: The 2005 IEEE Symposium on Security and Privacy - S&P 2005, pp. 49–63. IEEE Computer Society (2005)

    Google Scholar 

  20. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.: SPINS: Security Protocols for Sensor Netowkrs. In: The 7th Annual ACM International Conference on Mobile Computing and Networks - Mobicom 2001, pp. 189–199. ACM Press (2001)

    Google Scholar 

  21. Ren, K., Lou, W.: Communication Security in Wireless Sensor Network, VDM Verlag Dr. Müller (2008)

    Google Scholar 

  22. Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and Architectures, Request for Comments (RFC 2627), Internet Engineering Task Force (June 1999), http://tools.ietf.org/html/rfc2627

  23. Zhang, W., Tran, M., Zhu, S., Cao, G.: A Random Perturbation-Based Scheme for Pairwise Key Establishment in Sensor Netowkrs. In: The 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing - MobiHoc 2007, pp. 90–99. ACM Press (2007)

    Google Scholar 

  24. Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: The 10th ACM Conference on Computer and Communication Security - CCS 2003, pp. 62–72. ACM Press (2003)

    Google Scholar 

  25. Zhu, S., Setia, S., Jajodia, S.: LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. ACM Transactions on Sensor Networks 2(4), 500–528 (2006)

    Article  Google Scholar 

  26. Zhu, S., Xu, S., Setia, S., Jajodia, S.: Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. In: The 11th IEEE International Conference on Network Protocols - ICNP 2003, pp. 326–335. IEEE Computer Society (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Fan, X., Gong, G. (2013). LPKM: A Lightweight Polynomial-Based Key Management Protocol for Distributed Wireless Sensor Networks. In: Zheng, J., Mitton, N., Li, J., Lorenz, P. (eds) Ad Hoc Networks. ADHOCNETS 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 111. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36958-2_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36958-2_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36957-5

  • Online ISBN: 978-3-642-36958-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics