Abstract

To achieve security in wireless sensor networks, it is important to be able to encrypt and authenticate messages sent between sensor nodes. Before doing so, keys for performing encryption and authentication must be agreed upon by the communicating parties. Due to resource constraints, however, achieving key agreement in wireless sensor networks is nontrivial. Many key agreement schemes used in general networks, such as Diffie-Hellman and other public-key based schemes, are not suitable for wireless sensor networks due to the limited computational abilities of the sensor nodes. Predistribution of secret keys for all pairs of nodes is not viable due to the large amount of memory this requires when the network size is large.In this paper, we provide a framework in which to study the security of key predistribution schemes, propose a new key predistribution scheme which substantially improves the resilience of the network compared to previous schemes, and give an in-depth analysis of our scheme in terms of network resilience and associated overhead. Our scheme exhibits a nice threshold property: when the number of compromised nodes is less than the threshold, the probability that communications between any additional nodes are compromised is close to zero. This desirable property lowers the initial payoff of smaller-scale network breaches to an adversary, and makes it necessary for the adversary to attack a large fraction of the network before it can achieve any significant gain.

Highlights

  • Recent advances in electronic and computer technologies have paved the way for the proliferation of wireless sensor networks (WSNs)

  • When sensor networks are deployed in a hostile environment, security becomes extremely important, as these networks are prone to different types of malicious attacks

  • If we imagine a graph in which each sensor node is a vertex and there is an edge between nodes only if they can establish a shared key, Blom’s scheme results in a complete graph

Read more

Summary

A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks

WENLIANG DU and JING DENG Syracuse University YUNGHSIANG S. Our scheme exhibits a nice threshold property: when the number of compromised nodes is less than the threshold, the probability that communications between any additional nodes are compromised is close to zero This desirable property lowers the initial payoff of smaller-scale network breaches to an adversary, and makes it necessary for the adversary to attack a large fraction of the network before it can achieve any significant gain. ACM Journal Name, Vol V, No N, Month 20YY, Pages 1–0??

INTRODUCTION
Main Contributions
Other Related Work
A SECURITY FRAMEWORK FOR KEY PRE-DISTRIBUTION SCHEMES
BACKGROUND
MULTIPLE-SPACE KEY PRE-DISTRIBUTION SCHEME
Key Pre-Distribution Phase
Key Agreement Phase
SECURITY ANALYSIS
Probability of At Least One Space Being Broken
The Fraction of Network Communication that is Compromised
Communication Overhead
Computational Overhead
IMPROVING SECURITY USING TWO-HOP NEIGHBORS
Security Improvement
Overhead Analysis
Findings
CONCLUSIONS
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call