Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks
Key pre-distribution schemes are a favored solution for establishing secure communication in sensor networks. Often viewed as the safest way to bootstrap trust, the main drawback is seen to be the large storage overhead imposed on resource-constrained dev
- PDF / 351,889 Bytes
- 11 Pages / 430 x 660 pts Page_size
- 33 Downloads / 268 Views
2
College of Signals, NUST, Rawalpindi, Pakistan [email protected], [email protected] Jodrey School of Computer Science, Acadia University, Nova Scotia, Canada [email protected] 3 School of Multimedia, Hannam University, Daejeon, Korea [email protected]
Abstract. Key pre-distribution schemes are a favored solution for establishing secure communication in sensor networks. Often viewed as the safest way to bootstrap trust, the main drawback is seen to be the large storage overhead imposed on resource-constrained devices and also these schemes are quite insecure because pre-loading global secrets onto exposed devices strengthens the incentive for attackers to compromise nodes. To overcome these drawback, we propose a new key predistribution scheme for pairwise key setup in sensor networks. In our scheme each sensor node is assigned with small number of randomly selected generation keys instead of storing big number of random keys and a shared secrete key can be efficiently computed from it. After generating the keys with neighbors the initial keys rings are being deleted from nodes memory. The analysis of our approach shows that it improves the previous random key pre-distribution schemes by providing the more resiliency against node capture and collusion attacks. Even if a node being compromised, an adversary can only exploit a small number of keys nearby the compromised node, while other keys in the network remain safe.
1
Introduction
A wireless sensor network typically consists of a potentially large number of incredibly resource constrained sensor nodes. Each sensor node is usually battery powered, and has a low-end processor, a limited amount of memory, and a low power communication module capable of short-range wireless communication. Their lifetime is determined by their ability to conserve power. The sensor nodes form an ad-hoc network through the wireless links. There are many technological hurdles that must be overcome for ad hoc sensor networks to become practical though. All of these constraints require new hardware designs, software applications, and network architectures that maximize the motes capabilities while keeping them inexpensive to deploy and maintain. Wireless sensor networks are ideal candidates for a wide range of applications, such as target tracking and monitoring of critical infrastructures[1]. M. Denko et al. (Eds.): EUC Workshops 2007, LNCS 4809, pp. 1–11, 2007. c IFIP International Federation for Information Processing 2007
2
F. Kausar et al.
Secret communication is an important requirement in many sensor network applications, so shared secret keys are used between communicating nodes to encrypt data. Some of the major constraints like ad hoc nature, intermittent connectivity, and resource limitations of the sensor networks prevent traditional key management and distribution schemes to be applicable to WSN. A typical WSN may contain from hundreds to thousands of sensor nodes. So any protocol used for key management and distribution should be adaptable to such sca
Data Loading...