Establishing Pairwise Keys Using Key Predistribution Schemes for Sensor Networks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33093
Establishing Pairwise Keys Using Key Predistribution Schemes for Sensor Networks

Authors: Y. Harold Robinson, M. Rajaram

Abstract:

Designing cost-efficient, secure network protocols for Wireless Sensor Networks (WSNs) is a challenging problem because sensors are resource-limited wireless devices. Security services such as authentication and improved pairwise key establishment are critical to high efficient networks with sensor nodes. For sensor nodes to correspond securely with each other efficiently, usage of cryptographic techniques is necessary. In this paper, two key predistribution schemes that enable a mobile sink to establish a secure data-communication link, on the fly, with any sensor nodes. The intermediate nodes along the path to the sink are able to verify the authenticity and integrity of the incoming packets using a predicted value of the key generated by the sender’s essential power. The proposed schemes are based on the pairwise key with the mobile sink, our analytical results clearly show that our schemes perform better in terms of network resilience to node capture than existing schemes if used in wireless sensor networks with mobile sinks.

Keywords: Wireless Sensor Networks, predistribution scheme, cryptographic techniques.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1107335

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1589

References:


[1]. G.J. Pottie and W.J. Kaiser, “Wireless Integrated Network Sensors,” Comm. ACM, vol. 43, pp. 51-58, 2010.
[2]. T. Gao, D. Greenspan, M. Welesh, R.R. Juang, and A. Alm, “Vital Signs Monitoring and Patient Tracking Over a Wireless Network,” Proc. 27th Ann. Int’l Conf. IEEE Eng. in Medicine and Biology Soc. (EMBS), Sept. 2009.
[3]. L. Gu, D. Jia, P. Vicaire, T. Yan, L. Luo, A. Tirumala, Q. Cao, T. He, J.A. Stankovic, T. Abdelzaher, and B.H. Krogh, “Lightweight Detection and Classification for Wireless Sensor Networks in Realistic Environments,” Proc. Third ACM Conf. Embedded Networked Sensor Systems, Nov. 2009.
[4]. I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A Survey on Sensor Networks,” IEEE Comm. Magazine, vol. 40, no. 8, pp. 102-114, Aug. 2009.
[5]. J. Kahn, R. Katz, and K. Pister, “Next Century Challenges: Mobile Networking for Smart Dust,” Proc. ACM MobiCom ’2008.
[6]. T. Small and Z. Haas, “The Shared Wireless Infostation Model—A New Ad Hoc Networking Paradigm (or Where there is a Whale, there is a Way),” Proc. ACM MobiHoc, 2009.
[7]. P. Juang, H. Oki, Y. Wang, M. Martonosi, L. Peh, and D.Rubenstein, “Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with Zebranet,” Proc. 10th Ann. Conf. Architectural Support for Programming Languages and Operating Systems (ASPLOS), 2007.
[8]. Amuthan Mathy.P , Gowri Sankar.U “Filtering Injected False Data in Wireless Sensor Networks by Using L, F, S Nodes and Key Distribution” International Journal of Innovative Research in Computer and Communication Engineering (An ISO 3297: 2007 Certified Organization) Vol.2, Special Issue 1, March 2014.