Abstract

Security in wireless sensor networks is commonly based on symmetric encryption and requires key-management systems to establish and exchange secret keys. A constraint that is common to many key-management approaches is an upper bound to the total number of nodes in the network. An example is represented by the schemes based on combinatorial design. These schemes use specific rules for the generation of sets of keys that are distributed to the nodes before deploying the network. The aim of these approaches is to improve the resilience of the network. However, the quantity of data that must be stored by each node is proportional to the number of nodes of the network, so the available memory affects the applicability of these schemes. This paper investigates the opportunity of reducing the storage overhead by distributing the same set of keys to more than one node. In addition, the presence of redundant sets of keys affects the resilience and the security of the network. A careful analysis is conducted to evaluate benefits and drawbacks of redundant key distribution approaches. The results show that the use of redundancy decreases the level of resilience, but it scales well on very large networks.

Highlights

  • A Wireless Sensor network (WSN) is a distributed computer network

  • WSNs are currently applied in many fields, from military applications [1] to cold chain monitoring [2,3]

  • Among block design a class often used for key management is the Symmetric Balanced Incomplete Block Design (SBIBD)

Read more

Summary

Introduction

A Wireless Sensor network (WSN) is a distributed computer network. The nodes that compose the WSN are autonomous devices which can collect data from the surrounding environment, perform some elaborations and communicate wirelessly with the other nodes of the network. Since WSNs have specific characteristics, such as low computational capabilities and a large quantity of autonomous distributed nodes, they require specific key-management schemes to generate and distribute the keys used to encrypt and/or authenticate the messages. There exist lightweight public key schemes [4], they are only applied if the involved devices are considered compliant with the additional overhead [5,6]. Many key-management schemes based on different approaches have been proposed. Many approaches are based on predeployment key distribution. Some of these schemes involve a memory overhead proportional to the number of nodes in the network. In this way the size of the network is the double, with the same memory overhead.

Related Works
Global Key
Random Key Predistribution Approaches
Combinatorial Design
Redundant Key Management
Analysis and Evaluation
Resilience
Experimental Analysis
Validation
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call