Location-aware key management scheme for wireless sensor networks

Dijiang Huang, Manish Mehta, Deep Medhi, Lein Harn

Research output: Chapter in Book/Report/Conference proceedingConference contribution

195 Scopus citations

Abstract

Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. Recently, several pairwise key schemes have been proposed for large distributed sensor networks. These schemes randomly select a set of keys from a key pool and install the keys in the memory of each sensor. After deployment, the sensors can set up keys by using the preinstalled keys. Due to lack of tamper-resistant hardware, the sensor networks are vulnerable to node capture attacks. The information gained from captured nodes can be used to compromise communication among uncompromised sensors. Duetal. [1], Liu and Ning [2] proposed to use the known deployment information to reduce the memory requirements and mitigate the consequences of node capture attack. Our analysis shows that the assumption of random capture of sensors is too weak. An intelligent attacker can selectively capture sensors to get more information with less efforts. In addition to selective node capture attack, all recent proposals are vulnerable to node fabrication attack, in which an attacker can fabricate new sensors by manipulating the compromised secret keys and then deploy the fabricated sensors into the sensor system. To counter these attacks, we propose a grid-group scheme which uses known deployment information. Unlike the pairwise key scheme using deployment information proposed by Du et al, we uniformly deploy sensors in a large area; instead of randomly distributing keys from a large key pool to each sensor, we systematically distribute secret keys to each sensor from a structured key pool. Our performance analysis shows that our scheme requires less number of keys preinstalled for each sensor and is resilient to selective node capture attack and node fabrication attack.

Original languageEnglish (US)
Title of host publicationProceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN'04
PublisherAssociation for Computing Machinery
Pages29-42
Number of pages14
ISBN (Print)1581139721, 9781581139723
DOIs
StatePublished - 2004
Externally publishedYes
EventProceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN'04 - Washington, DC, United States
Duration: Oct 25 2004Oct 25 2004

Publication series

NameProceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN'04

Conference

ConferenceProceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks, SASN'04
Country/TerritoryUnited States
CityWashington, DC
Period10/25/0410/25/04

Keywords

  • Key management
  • Probabilistic key sharing
  • Sensor networks

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'Location-aware key management scheme for wireless sensor networks'. Together they form a unique fingerprint.

Cite this