Clique-based group key assignment in Wireless Sensor Networks

نویسندگان

  • Avinash Srinivasan
  • Feng Li
  • Jie Wu
  • Minglu Li
چکیده

Security has become the corner stone of research in wireless sensor networks (WSNs). Due to the unique operational environment of WSNs, where the communication medium is open to eavesdroppers, the threats manifest in new forms necessitating the safeguarding of communication. Consequently, key management protocols have become paramount in mitigating the damage caused. Numerous group-key protocols have been proposed in an effort to secure both inter and intra network communication. However, the group-key protocols in literature neither address the issue of the size of a group nor its geographic boundaries. Therefore, in applications like watchdogbased reputation monitoring systems, malicious users are encouraged to pollute the reputation values by bad-mouthing benign nodes and false-praising other collaborating malicious nodes. On the otherhand, though pairwise-key protocols can overcome the above drawback of group-key protocols, they are highly restrictive and impose substantial storage overhead on resource constrained sensors. They do not suit the reputation monitoring systems either, since messages encrypted with pairwise-keys render promiscuous watchdog monitoring systems useless. In this paper, we propose CAGE a novel, distributed, clique-based group-key assignment protocol, which distinctly addresses the size and geographic restrictions on groups. Our protocol is a simple distributed method, yet effective in securing the neighborhood communication and ideally suits the promiscuous monitoring requirements of reputation and trust-based systems. CAGE ensures pairwise connectivity of all group members which thwarts information asymmetry (bad-mouthing) attacks. We confirm through simulations and analysis that CAGE strikes an optimal balance between pairwise-key and group-key protocols and that it achieves an optimal solution. We then present the improvised CAGE, which we refer to as the Extended CAGE (E-CAGE). E-CAGE achieves the same results as CAGE with mitigated computation time compared to CAGE. We confirm this through simulation results.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hypercube Bivariate-Based Key Management for Wireless Sensor Networks

Wireless sensor networks are composed of very small devices, called sensor nodes,for numerous applications in the environment. In adversarial environments, the securitybecomes a crucial issue in wireless sensor networks (WSNs). There are various securityservices in WSNs such as key management, authentication, and pairwise keyestablishment. Due to some limitations on sensor nodes, the previous k...

متن کامل

LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

متن کامل

Toward an energy efficient PKC-based key management system for wireless sensor networks

Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...

متن کامل

An efficient symmetric polynomial-based key establishment protocol for wireless sensor networks

An essential requirement for providing secure services in wireless sensor networks is the ability to establish pairwise keys among sensors. Due to resource constraints on the sensors, the key establishment scheme should not create significant overhead. To date, several key establishment schemes have been proposed. Some of these have appropriate connectivity and resistance against key exposure, ...

متن کامل

Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design

Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...

متن کامل

A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJSN

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2008