Establishing Pairwise Keys Using Key Predistribution Schemes for Sensor Networks

Designing cost-efficient, secure network protocols for Wireless Sensor Networks (WSNs) is a challenging problem because sensors are resource-limited wireless devices. Security services such as authentication and improved pairwise key establishment are critical to high efficient networks with sensor nodes. For sensor nodes to correspond securely with each other efficiently, usage of cryptographic techniques is necessary. In this paper, two key predistribution schemes that enable a mobile sink to establish a secure data-communication link, on the fly, with any sensor nodes. The intermediate nodes along the path to the sink are able to verify the authenticity and integrity of the incoming packets using a predicted value of the key generated by the sender’s essential power. The proposed schemes are based on the pairwise key with the mobile sink, our analytical results clearly show that our schemes perform better in terms of network resilience to node capture than existing schemes if used in wireless sensor networks with mobile sinks.




References:
[1]. G.J. Pottie and W.J. Kaiser, “Wireless Integrated Network Sensors,”
Comm. ACM, vol. 43, pp. 51-58, 2010.
[2]. T. Gao, D. Greenspan, M. Welesh, R.R. Juang, and A. Alm, “Vital
Signs Monitoring and Patient Tracking Over a Wireless Network,” Proc.
27th Ann. Int’l Conf. IEEE Eng. in Medicine and Biology Soc. (EMBS),
Sept. 2009.
[3]. L. Gu, D. Jia, P. Vicaire, T. Yan, L. Luo, A. Tirumala, Q. Cao, T. He,
J.A. Stankovic, T. Abdelzaher, and B.H. Krogh, “Lightweight Detection
and Classification for Wireless Sensor Networks in Realistic
Environments,” Proc. Third ACM Conf. Embedded Networked Sensor
Systems, Nov. 2009.
[4]. I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A
Survey on Sensor Networks,” IEEE Comm. Magazine, vol. 40, no. 8, pp.
102-114, Aug. 2009.
[5]. J. Kahn, R. Katz, and K. Pister, “Next Century Challenges: Mobile
Networking for Smart Dust,” Proc. ACM MobiCom ’2008.
[6]. T. Small and Z. Haas, “The Shared Wireless Infostation Model—A New
Ad Hoc Networking Paradigm (or Where there is a Whale, there is a
Way),” Proc. ACM MobiHoc, 2009.
[7]. P. Juang, H. Oki, Y. Wang, M. Martonosi, L. Peh, and D.Rubenstein,
“Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs
and Early Experiences with Zebranet,” Proc. 10th Ann. Conf.
Architectural Support for Programming Languages and Operating
Systems (ASPLOS), 2007.
[8]. Amuthan Mathy.P , Gowri Sankar.U “Filtering Injected False Data in
Wireless Sensor Networks by Using L, F, S Nodes and Key
Distribution” International Journal of Innovative Research in Computer
and Communication Engineering (An ISO 3297: 2007 Certified
Organization) Vol.2, Special Issue 1, March 2014.