Abstract
Due to the critical resource constraints of wireless sensor nodes such as processing speed, memory size and energy supply, implementing security mechanisms, in particular key management schemes, is quite challenging. Motivated by the conference key establishment scheme proposed by Harn and Gong in [11], we propose LPKM (Lightweight Polynomial-based Key Management Protocol), a key management scheme for distributed WSNs. LPKM enables sensor nodes to establish different types of keys to bootstrap trust and secure one-to-one and one-to-many communications in a flexible, reliable, and non-interactive way. Moreover, LPKM can effectively mitigate or thwart the most common attacks to WSNs such as node clone attacks, node impersonation attacks, etc. In addition, LPKM can tolerate changes of network topology and incurs little computational and communication overhead. Our experimental results on MICAz motes show that LPKM can be efficiently implemented on low-cost sensor nodes. In particular, a MICAz mote running at a frequency of 8MHz can generate required group keys of 128-bit in a few milliseconds, at a cost of 6.12 KBytes ROM and 68 Bytes RAM.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Albrecht, M., Gentry, C., Halevi, S., Katz, J.: Attacking Cryptographic Schemes Based on “Perturbation Polynomials”. In: The 16th ACM Conference on Computer and Communication Security - CCS 2009, pp. 1–10. ACM Press (2009)
Balenson, D., McGrew, D., Sherman, A.: Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization. In: IETF Internet Draft (August 2000), http://tools.ietf.org/html/draft-irtf-smug-groupkeymgmt-oft-00
Bellare, M., Kilian, J., Rogaway, P.: The Security of the Cipher Block Chaining Message Authentication Code. Journal of Computer and System Sciences 61(3), 362–399 (2000)
Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-Secure Key Distribution for Dynamic Conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)
Chan, H., Perrig, A.: Security and Privacy in Sensor Networks. IEEE Computer Magazine 36(10), 103–105 (2003)
Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: The 2003 IEEE Symposium on Security and Privacy - S&P 2003, pp. 197–213. IEEE Computer Society (2003)
Crossbow Technology Inc., MICAz – Wireless Measurement System, http://bullseye.xbow.com:81/Products/Product_pdf_files/Wireless_pdf/MICAz_Datasheet.pdf .
Du, W., Deng, J., Han, Y., Varshney, P.: A Pairwise Key Pre-Distribution Schemes for Wireless Sensor Networks. In: The 10th ACM Conference on Computer and Communication Security - CCS 2003, pp. 42–51. ACM Press (2003)
Du, X., Guizani, G., Xiao, Y., Chen, H.-H.: A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks. IEEE Transactions on Wireless Communications 8(3), 1223–1229 (2009)
Eschenauer, L., Gligor, V.: A Key-Management Scheme for Distributed Sensor Networks. In: The 9th ACM Conference on Computer and Communication Security - CCS 2002, pp. 41–47. ACM Press (2002)
Harn, L., Gong, G.: Conference Key Establishment Using Polynomials, Centre for Applied Cryptographic Research (CACR). Technical Reports, CACR 2012-10, http://cacr.uwaterloo.ca/techreports/2012/cacr2012-10.pdf , 2012.
Hung, H., Muckenhirn, C., Rivers, T.: Group Key Management Protocol (GKMP) Architecture, Request for Comments (RFC 2094), Internet Engineering Task Force (July 1997), http://tools.ietf.org/html/rfc2094
IEEE Standard 802.15.4: Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specification for Low-Rate Wireless Personal Area Networks (WPANs). IEEE Computer Soceity (June 2006)
Liu, D., Ning, P.: Establishing Pairwise Keys in Distributed Sensor Netowrks. In: The 10th ACM Conference on Computer and Communication Security - CCS 2003, pp. 52–61. ACM Press (2003)
Liu, D., Ning, P.: Security for Wireless Sensor Networks. Advances in Information Security Series. Springer (2006)
López, J., Zhou, J.: Wireless Sensor Network Security. Cryptology and Information Security Series. IOS Press (2008)
Malan, D., Welsh, M., Smith, M.D.: Implementing Public-Key Infrastructure for Sensor Networks. ACM Transactions on Sensor Networks 4(4), Article No: 22 (2008)
Mandal, K., Fan, X., Gong, G.: A Light weight Pseudorandom Number Generator for EPC Class 1 Gen 2 RFID Tags. In: West European Workshop on Research in Cryptography - WEWoRC 2011, Conference Record, pp. 91–95 (2011)
Parno, B., Perrig, A., Gligor, V.: Distributed Detection of Node Replication Attacks in Sensor Networks. In: The 2005 IEEE Symposium on Security and Privacy - S&P 2005, pp. 49–63. IEEE Computer Society (2005)
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.: SPINS: Security Protocols for Sensor Netowkrs. In: The 7th Annual ACM International Conference on Mobile Computing and Networks - Mobicom 2001, pp. 189–199. ACM Press (2001)
Ren, K., Lou, W.: Communication Security in Wireless Sensor Network, VDM Verlag Dr. Müller (2008)
Wallner, D., Harder, E., Agee, R.: Key Management for Multicast: Issues and Architectures, Request for Comments (RFC 2627), Internet Engineering Task Force (June 1999), http://tools.ietf.org/html/rfc2627
Zhang, W., Tran, M., Zhu, S., Cao, G.: A Random Perturbation-Based Scheme for Pairwise Key Establishment in Sensor Netowkrs. In: The 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing - MobiHoc 2007, pp. 90–99. ACM Press (2007)
Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: The 10th ACM Conference on Computer and Communication Security - CCS 2003, pp. 62–72. ACM Press (2003)
Zhu, S., Setia, S., Jajodia, S.: LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. ACM Transactions on Sensor Networks 2(4), 500–528 (2006)
Zhu, S., Xu, S., Setia, S., Jajodia, S.: Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. In: The 11th IEEE International Conference on Network Protocols - ICNP 2003, pp. 326–335. IEEE Computer Society (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Fan, X., Gong, G. (2013). LPKM: A Lightweight Polynomial-Based Key Management Protocol for Distributed Wireless Sensor Networks. In: Zheng, J., Mitton, N., Li, J., Lorenz, P. (eds) Ad Hoc Networks. ADHOCNETS 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 111. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36958-2_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-36958-2_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36957-5
Online ISBN: 978-3-642-36958-2
eBook Packages: Computer ScienceComputer Science (R0)