An Enhanced Key Management Scheme Based on Key Infection in Wireless Sensor Networks
We propose an enhanced key management scheme
based on Key Infection, which is lightweight scheme for tiny sensors.
The basic scheme, Key Infection, is perfectly secure against node
capture and eavesdropping if initial communications after node
deployment is secure. If, however, an attacker can eavesdrop on
the initial communications, they can take the session key. We use
common neighbors for each node to generate the session key. Each
node has own secret key and shares it with its neighbor nodes. Then
each node can establish the session key using common neighbors-
secret keys and a random number. Our scheme needs only a few
communications even if it uses neighbor nodes- information. Without
losing the lightness of basic scheme, it improves the resistance against
eavesdropping on the initial communications more than 30%.
[1] L. Eschenauer and V. D. Gligor, A Key-management Scheme for Distributed
Sensor Networks, Proceedings of the 9th ACM conference on
Computer, 2002.
[2] H. Chan and A. Perrig and D. Song, Random Key Predistribution Schemes
for Sensor Networks, IEEE Symposium on Security and Privacy, 2003.
[3] R. Anderson, H. Chan and A. Perrig, Key Infecition: Smart Trust for
Smart Dust, 12th IEEE International Conference on Network Protocols
(ICNP), Oct. 2004.
[4] C. Hartung, J. Balasalle, and R. Han, Node Compromise in Sensor
Networks: The Need for Secure Systems, Technical Report CU-CS-
988-04, Dept. of Computer Science, University of Colorado at Boulder,
2004.
[5] B. C. Neuman and T. Ts-o, Kerberos: An authentication service for
computer networks, IEEE Communications magazine, 1994.
[6] W. Diffie and M. E. Hellman, New Directions in Cryptography, IEEE
Transactions on Information Theory, vol. IT-22, Nov. 1976, pp: 644-654.
[7] R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital
signatures and public-key cryptosystems, Communications of the ACM,
1978.
[8] B. A. Forouzan, Cryptography and Network Security, McGraw Hill,
2008.
[1] L. Eschenauer and V. D. Gligor, A Key-management Scheme for Distributed
Sensor Networks, Proceedings of the 9th ACM conference on
Computer, 2002.
[2] H. Chan and A. Perrig and D. Song, Random Key Predistribution Schemes
for Sensor Networks, IEEE Symposium on Security and Privacy, 2003.
[3] R. Anderson, H. Chan and A. Perrig, Key Infecition: Smart Trust for
Smart Dust, 12th IEEE International Conference on Network Protocols
(ICNP), Oct. 2004.
[4] C. Hartung, J. Balasalle, and R. Han, Node Compromise in Sensor
Networks: The Need for Secure Systems, Technical Report CU-CS-
988-04, Dept. of Computer Science, University of Colorado at Boulder,
2004.
[5] B. C. Neuman and T. Ts-o, Kerberos: An authentication service for
computer networks, IEEE Communications magazine, 1994.
[6] W. Diffie and M. E. Hellman, New Directions in Cryptography, IEEE
Transactions on Information Theory, vol. IT-22, Nov. 1976, pp: 644-654.
[7] R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital
signatures and public-key cryptosystems, Communications of the ACM,
1978.
[8] B. A. Forouzan, Cryptography and Network Security, McGraw Hill,
2008.
@article{"International Journal of Information, Control and Computer Sciences:59080", author = "Han Park and JooSeok Song", title = "An Enhanced Key Management Scheme Based on Key Infection in Wireless Sensor Networks", abstract = "We propose an enhanced key management scheme
based on Key Infection, which is lightweight scheme for tiny sensors.
The basic scheme, Key Infection, is perfectly secure against node
capture and eavesdropping if initial communications after node
deployment is secure. If, however, an attacker can eavesdrop on
the initial communications, they can take the session key. We use
common neighbors for each node to generate the session key. Each
node has own secret key and shares it with its neighbor nodes. Then
each node can establish the session key using common neighbors-
secret keys and a random number. Our scheme needs only a few
communications even if it uses neighbor nodes- information. Without
losing the lightness of basic scheme, it improves the resistance against
eavesdropping on the initial communications more than 30%.", keywords = "Wireless Sensor Networks, Key Management", volume = "3", number = "12", pages = "2860-6", }