Key Predistribution in Wireless Sensor Networks When Sensors Are Within Communication Range

نویسندگان

  • Sushmita Ruj
  • Amiya Nayak
  • Ivan Stojmenovic
چکیده

Wireless networks are more vulnerable to security threats than wired networks. Since sensors are resource constrained, the use of traditional cryptographic key management techniques is not practical. Hence keys are distributed in sensor nodes prior to their deployment. This method, called key predistribution, was investigated recently in a number of studies. This chapter restricts the discussion to single-hop networks, where any two sensors are within communication range of each other. The goal is to enable any two sensor nodes to exchange information using their common key, so that other sensors, or an adversary, are unable to decode the message. If two sensor nodes do not share a common key then a path between them, via other sensor nodes, is established, with sensors on the path being able to decode a message and forward it encrypted with a new key. We describe different types of key predistribution schemes for single-hop networks and discuss their merits and demerits in terms of resiliency (impact of node compromises), scalability, connectivity, and memory, computation, and communication resources. Shared-key discovery process should minimize the use of communication bandwidth. We also discuss the identification of compromised nodes and revocation techniques.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Random Key Pre-Distribution Techniques against Sybil Attacks

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...

متن کامل

An efficient solution for management of pre-distribution in wireless sensor networks

A sensor node is composed of different parts including processing units, sensor, transmitter, receiver, and security unit. There are many nodes in a sensor unit. These networks can be used for military, industrial, medicine, environmental, house, and many other applications. These nodes may be established in the lands of enemies to monitor the relations. Hence, it is important to consider conse...

متن کامل

An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks

An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...

متن کامل

Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design

Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...

متن کامل

Unauthenticated event detection in wireless sensor networks using sensors co-coverage

Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011