Articles

 Highly Resilient Key Distribution Strategy for Multi-level
Heterogeneous Sensor Networks by Using Deployment Knowledge

Expand
  • (Department of Computer Science and Information
    Engineering, National Chiayi University, Chiayi 60004)

Received date: 2011-03-10

  Online published: 2011-10-20

Abstract

Abstract:  The most important problem in the security of wireless sensor
network (WSN) is to distribute keys for the sensor nodes and to establish a
secure channel in an insecure environment. Since the sensor node has limited
resources, for instance, low battery life and low computational power, the
key distribution scheme must be designed in an efficient manner. Recently
many studies added a few high-level nodes into the network, called the
heterogeneous sensor network (HSN). Most of these studies considered an
application for two-level HSN instead of multi-level one. In this paper, we
propose some definitions for multi-level HSN, and design a novel key
management strategy based on the polynomial hash tree (PHT) method by using
deployment knowledge. Our proposed strategy has lower computation and
communication overheads but higher connectivity and resilience.

Cite this article

WANG Chih-hung (王智弘), WEI Shih-yi (魏仕益) .  Highly Resilient Key Distribution Strategy for Multi-level
Heterogeneous Sensor Networks by Using Deployment Knowledge[J]. Journal of Shanghai Jiaotong University(Science), 2011
, 16(5) : 593 -599 . DOI: 10.1007/s12204-011-1194-4

References

1  Akyildiz I F, Su W, Sankarasubramamiam Y, et al. Wireless sensor networks: A survey [J].  Computer Networks, 2002,  38: 393-422.
2  Chan H, Gligor V D, Perrig A, et al. On the distribution and revocation of cryptographic keys in sensor networks [J].  IEEE Transactions on Dependable and Secure Computing, 2005,  2: 233-247.
3  Chan H, Perrig A H, Song D. Random key predistribution scheme for sensor networks [C]// Proceedings of IEEE Symposium Security and Privacy (SP'03).   [s.l.]: IEEE, 2003: 197-213.
4  Chan H, Perrig A H, Song D H. Key distribution techniques for sensor networks, wireless sensor networks [M]. Norwell, MA, USA: Kluwer Academic Publishers, 2004: 277-303.
5  Du W, Deng J, Han Y S, et al. A key predistribution scheme for sensor networks using deployment knowledge [J].  IEEE Transactions on Dependable and Secure Computing, 2006,  3(1): 62-77.
6  Eschenauer L, Gligor V. A key management scheme for distributed sensor networks [C]// Proceedings of ACM Conference on Computer and Communications Security (CCS'02). Washington, DC, USA: ACM Press, 2002: 41-47.
7  Huang D, Mehta M, Van De Liefvoort A, et al. Modeling pairwise key establishment for random key predistribution in large-scale sensor networks [J].  IEEE/ACM Transactions on Networking, 2007,  15(5): 1204-1215.
8  Walters J P, Liang Z, Shi W, et al. Wireless sensor network security: A survey [C]//  Security in Distributed, Grid, and Pervasive Computing. Exton, Pennsylvania, USA: CRC Press, 2006: 367-410.
9  Park T, Shin K G. LiSP: A lightweight security protocol for wireless sensor networks [J].  ACM Transactions on Embedded Computing Systems (TECS),  2004,  3: 634-660.
10

 Pister K, Kahn J, Boser B. Smart dust [EB/OL]. (2009-06-01). http://robotics.eecs.berkeley.edu/~pister/SmartDust/.
11  Kauar F, Hussian S, Yang L T, et al. Scalable and efficient key management for heterogeneous sensor networks [J].  The Journal of Supercomputing, 2008,  45(1): 44-65.
12  Lu K, Qian Y, Hu J. A framework for distributed key management schemes in heterogeneous wireless sensor networks [C]// Proceedings of 25th IEEE International Performance, Computing, and Communications Conference, IPCCC 2006. [s.l.]: IEEE, 2006: 513-519.
13  Traynor P, Kumar R, Choi H, et al. Efficient hybrid security mechanisms for heterogeneous sensor networks [J].  IEEE Transactions on Mobile Computing, 2007,  6: 663-677.
14  Liu D, Ning P. Location-based pairwise key establishments for static sensor networks [C]//  ACM Workshop on Security in Ad Hoc and Sensor Networks  (SASN '03). [s.l.]: ACM Press, 2003: 72-82.
15  Yu Z, Guan Y. A key pre-distribution scheme using deployment knowledge for wireless sensor networks [C]//  Proceedings of Fourth International Symposium on Information Processing in Sensor Networks. Piscataway, NJ, USA: IEEE, 2005: 261-268.
16  Liu D, Ning P. Establishing pairwise keys in distributed sensor networks [C]//  Proceedings of 10th ACM Conference on Computer and Communications Security (CCS'03). Washington, DC, USA: ACM Press, 2003: 52-61.
17  Blundo C, Santis A D, Herzberg A, et al. Perfectly-secure key distribution for dynamic conferences [C]//  Proceedings of Advances in Cryptology-CRYPTO'92, LNCS 740. California, USA: ACM Press, 1993: 471-486.
 
Options
Outlines

/