Key Management in Wireless Sensor Networks Using a Modified Blom Scheme

نویسنده

  • Rohith Singi Reddy
چکیده

Key establishment between any pair of nodes is an essential requirement for providing secure services in wireless sensor networks. Blom’s scheme is a prominent key management scheme but its shortcomings include large computation overhead and memory cost. We propose a new scheme in this paper that modifies Blom’s scheme in a manner that reduces memory and computation costs. This paper also provides the value for secure parameter t such that the network is resilient. INTRODUCTION Sensor networks comprise a number of sensors with limited resources that are used to collect environmental information and they have been considered for various purposes including security monitoring, target tracking and research activities in hazardous environments. Recent advances in both electronic and computer technologies have increased the demand of wireless sensor networks. Since authentication and confidentiality protocols require an agreed key between the nodes and security of the communication depends on the cryptographic schemes employed, key management is a very important security issue in wireless sensor networks. Earlier key management protocols were based on either symmetric or asymmetric cryptographic functions. Due to resource limitations and lack of security in the sensors, key management protocols based on public keys are inefficient. Hence, symmetric algorithm based key management protocols are used in wireless sensor networks [6]. Several people have proposed different approaches to address the problem of key management [8], [9], [10], [11], [12], [13]. The simple and easy method that could be employed is an online key management center [7]. But, this approach carries a high overhead. Another interesting method is to pre-distribute keys among the sensors, which can result in low cost key establishment in wireless sensor networks. But such schemes fail in handling security or efficiency problems. Some key management protocols use deployment knowledge to increase efficiency. In particular, key agreement schemes for wireless sensor networks must satisfy low energy consumption, low cost, low memory usage, lack of trusted infrastructure, resilient against node capture. Eschenauer and Gligor [1] proposed probabilistic key pre-distribution to establish pair-wise keys between neighboring nodes. In their scheme, each node is preloaded with a key subset from a global key pool in such a way that any two neighboring nodes can share at least one common key with a certain probability. This scheme is vulnerable to the node compromise attack, where keys of normal nodes can be known when some nodes are compromised by adversaries. Chan, Perrig, and Song [2] proposed the q-composite random key predistribution scheme, in which they modified E-G scheme by only increasing the number of keys that two random nodes share from at least 1 to at least q. Their scheme achieves good security under small scale attacks while increased vulnerability in large scale node

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

متن کامل

A Deterministic Multiple Key Space Scheme for Wireless Sensor Networks via Combinatorial Designs

The establishing of a pairwise key between two nodes for encryption in a wireless sensor network is a challenging issue. To do this, we propose a new deterministic key pre-distribution scheme which has modified the multiple key space scheme (MKSS). In the MKSS, the authors define two random parameters to make better resilience than existing schemes. Instead of a random selection of these parame...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...

متن کامل

Hypercube Bivariate-Based Key Management for Wireless Sensor Networks

Wireless sensor networks are composed of very small devices, called sensor nodes,for numerous applications in the environment. In adversarial environments, the securitybecomes a crucial issue in wireless sensor networks (WSNs). There are various securityservices in WSNs such as key management, authentication, and pairwise keyestablishment. Due to some limitations on sensor nodes, the previous k...

متن کامل

Hybrid Key pre-distribution scheme for wireless sensor network based on combinatorial design

Key distribution is an important problem in wireless sensor networks where sensor nodesare randomly scattered in adversarial environments.Due to the random deployment of sensors, a list of keys must be pre-distributed to each sensor node before deployment. To establish a secure communication, two nodes must share common key from their key-rings. Otherwise, they can find a key- path in which ens...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1103.5712  شماره 

صفحات  -

تاریخ انتشار 2011