Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32726
An Enhanced Key Management Scheme Based on Key Infection in Wireless Sensor Networks

Authors: Han Park, JooSeok Song


We propose an enhanced key management scheme based on Key Infection, which is lightweight scheme for tiny sensors. The basic scheme, Key Infection, is perfectly secure against node capture and eavesdropping if initial communications after node deployment is secure. If, however, an attacker can eavesdrop on the initial communications, they can take the session key. We use common neighbors for each node to generate the session key. Each node has own secret key and shares it with its neighbor nodes. Then each node can establish the session key using common neighbors- secret keys and a random number. Our scheme needs only a few communications even if it uses neighbor nodes- information. Without losing the lightness of basic scheme, it improves the resistance against eavesdropping on the initial communications more than 30%.

Keywords: Wireless Sensor Networks, Key Management

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1490


[1] L. Eschenauer and V. D. Gligor, A Key-management Scheme for Distributed Sensor Networks, Proceedings of the 9th ACM conference on Computer, 2002.
[2] H. Chan and A. Perrig and D. Song, Random Key Predistribution Schemes for Sensor Networks, IEEE Symposium on Security and Privacy, 2003.
[3] R. Anderson, H. Chan and A. Perrig, Key Infecition: Smart Trust for Smart Dust, 12th IEEE International Conference on Network Protocols (ICNP), Oct. 2004.
[4] C. Hartung, J. Balasalle, and R. Han, Node Compromise in Sensor Networks: The Need for Secure Systems, Technical Report CU-CS- 988-04, Dept. of Computer Science, University of Colorado at Boulder, 2004.
[5] B. C. Neuman and T. Ts-o, Kerberos: An authentication service for computer networks, IEEE Communications magazine, 1994.
[6] W. Diffie and M. E. Hellman, New Directions in Cryptography, IEEE Transactions on Information Theory, vol. IT-22, Nov. 1976, pp: 644-654.
[7] R. L. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, 1978.
[8] B. A. Forouzan, Cryptography and Network Security, McGraw Hill, 2008.