An Efficient Key Agreement Scheme for Wireless Sensor Networks Using Third Parties
نویسنده
چکیده
This paper contributes to the challenging field of security for wireless sensor networks by introducing a keyagreement scheme in which sensor nodes create secure radio connections with their neighbours depending on the aidof third parties. These third parties are responsible only for the pair-wise key establishment among sensor nodes,so they do not observe the physical phenomenon nor route data packets to other nodes. The proposed methodis explained here with respect to four important issues: how secret shares are distributed, how local neighboursare discovered, how legitimate third parties are verified, and how secure channels are established. Moreover, theperformance of the scheme is analyzed with regards to five metrics: local connectivity, resistance to node capture,memory usage, communication overhead, and computational burden.Our scheme not only secures the transmissionchannels of nodes but also guarantees high local connectivity of the sensor network, low usage of memory resources,perfect network resilience against node capture, and complete prevention against impersonation attacks. As it isdemonstrated in this paper, using a number of third parties equals to 10% of the total number of sensor nodes inthe area of interest, the proposed method can achieve at least 99.42% local connectivity with a very low usage ofavailable storage resources (less than 385 bits on each sensor node).
منابع مشابه
Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملAn efficient symmetric polynomial-based key establishment protocol for wireless sensor networks
An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...
متن کاملA Deterministic Multiple Key Space Scheme for Wireless Sensor Networks via Combinatorial Designs
The establishing of a pairwise key between two nodes for encryption in a wireless sensor network is a challenging issue. To do this, we propose a new deterministic key pre-distribution scheme which has modified the multiple key space scheme (MKSS). In the MKSS, the authors define two random parameters to make better resilience than existing schemes. Instead of a random selection of these parame...
متن کاملLPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring
Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...
متن کاملA novel key management scheme for heterogeneous sensor networks based on the position of nodes
Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1309.2334 شماره
صفحات -
تاریخ انتشار 2013