Online citations, reference lists, and bibliographies.
← Back to Search

Establishing Pairwise Keys In Distributed Sensor Networks

D. Liu, P. Ning
Published 2003 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
Pairwise key establishment is a fundamental security service in sensor networks; it enables sensor nodes to communicate securely with each other using cryptographic techniques. However, due to the resource constraints on sensors, it is infeasible to use traditional key management techniques such as public key cryptography and key distribution center (KDC). To facilitate the study of novel pairwise key predistribution techniques, this paper presents a general framework for establishing pairwise keys between sensors on the basis of a polynomial-based key predistribution protocol [2]. This paper then presents two efficient instantiations of the general framework: a random subset assignment key predistribution scheme and a grid-based key predistribution scheme. The analysis in this paper indicates that these two schemes have a number of nice properties, including high probability (or guarantee) to establish pairwise keys, tolerance of node captures, and low communication overhead. Finally, this paper presents a technique to reduce the computation at sensors required by these schemes.
This paper references
ACM Journal Name
10.1007/3-540-48071-4_33
Perfectly-Secure Key Distribution for Dynamic Conferences
C. Blundo (1992)
10.1145/986858.986870
Security support for in-network processing in Wireless Sensor Networks
Jing Deng (2003)
Cryptography and network security - principles and practice (3. ed.)
W. Stallings (1999)
10.1007/3-540-60590-8_7
The RC5 Encryption Algorithm
R. Rivest (1994)
Wireless sensor networks. http://www.xbow.com/Products/ Wireless Sensor Networks.htm. Accessed in
Crossbow (2004)
10.1109/INFCOM.2004.1354530
A key management scheme for wireless sensor networks using deployment knowledge
W. Du (2004)
Efficient and Secure Source Authentication for Multicast
A. Perrig (2001)
10.1145/948109.948120
LEAP: efficient security mechanisms for large-scale distributed sensor networks
S. Zhu (2003)
CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY
D. W. Carman (2000)
10.1145/986858.986868
Random key-assignment for secure Wireless Sensor Networks
R. Pietro (2003)
The resurrecting duckling: Security issues for ad hoc networks
Stajano (1999)
An interleaved hop-by-hop authentication scheme for filtering false data in sensor networks
S. ZHU (2004)
10.1109/SAINTW.2003.1210191
Secure aggregation for wireless networks
Lingxuan Hu (2003)
10.1145/586110.586117
A key-management scheme for distributed sensor networks
Laurent Eschenauer (2002)
10.1016/S1570-8705(03)00008-8
Secure routing in wireless sensor networks: attacks and countermeasures
C. Karlof (2003)
10.1109/SNPA.2003.1203362
Secure routing in wireless sensor networks: attacks and countermeasures
C. Karlof (2003)
Constrains and approaches for distributed sensor network security
D. W. Carman (2000)
An interleaved hop-by-hop authentication scheme for filtering false data in sensor networks
Zhu (2004)
10.1007/3-540-45682-1_17
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
D. Wong (2001)
The Art in Computer Programming
A. Hunt (2001)
10.1145/356989.356998
System architecture directions for networked sensors
Jason Hill (2000)
Skipjack and KEA algorithm specifications
Nist (1998)
SPINS: Security protocols
A. posium. PERRIG (2001)
1999.Cryptography and Network Security: Principles and Practic
W. rotocols. 172–194. STALLINGS (1999)
Denial of service in senso r networks.IEEE
A. D. Wood (2002)
The resurrecting duckling: security issues for ad hoc networks
F Stajano (1999)
10.1145/948109.948118
A pairwise key pre-distribution scheme for wireless sensor networks
W. Du (2003)
The Art of Computer Programming
D. E. Knuth (1968)
the art of computer programming: volume 1
D. Knuth (1968)
10.1145/941311.941313
Secure verification of location claims
Naveen Sastry (2003)
10.1145/781131.781133
The nesC language: A holistic approach to networked embedded systems
D. Gay (2003)
Cryptography and Network Security: Principles and Practice
W. Stallings (1998)
10.1109/MC.2002.1039518
Denial of Service in Sensor Networks
A. Wood (2002)
10.1145/986858.986869
Location-based pairwise key establishments for static sensor networks
D. Liu (2003)
10.1109/SECPRI.2000.848446
Efficient authentication and signing of multicast streams over lossy channels
A. Perrig (2000)
S.,AND VARSHNEY, P
DU W.ASN’03. (2004)
10.1145/984622.984660
The Sybil attack in sensor networks: analysis & defenses
J. Newsome (2004)
10.1109/SECPRI.2003.1199337
Random key predistribution schemes for sensor networks
H. Chan (2003)
Establishing Pairwise Keys in Sensor Networks @BULLET 77
(2005)
10.1145/6490.6503
How to construct random functions
Oded Goldreich (1986)
10.1109/IPSN.2004.1307346
The sybil attack in sensor networks: analysis & defenses
J. Newsome (2004)
The Art of Computer Programming 2 / Seminumerical Algorithms
D. Knuth (1971)
10.1145/501436.501438
Secure pebblenets
S. Basagni (2001)
10.1007/10720107_24
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
F. Stajano (1999)
The resurrecting duckling: Security issues for ad hoc networks
R. ANDERSON (1999)
10.1145/1053283.1053284
ACM Transactions on Information and System Security: Editorial
R. Sandhu (2005)
SPINS : Security Protocols for Sensor Networks
Jeffery Undercoffer (2002)
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks
D. Liu (2003)
10.1145/1053283.1053287
Establishing pairwise keys in distributed sensor networks
D. Liu (2005)
10.1109/SECPRI.2004.1301328
An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks
S. Zhu (2004)
Using Directional Antennas to Prevent Wormhole Attacks
Lingxuan Hu (2004)
10.1145/958491.958521
SIA: secure information aggregation in sensor networks
H. Chan (2003)
2003c. Location-based pairwise key establishments
IU D.L (2003)
A key-management scheme for distributed sensor
L. 42–51. ESCHENAUER (2002)



This paper is referenced by
Securing Virtual Coordinate System Based Routing in Wireless Sensor Networks
Jing Dong (2007)
10.1093/comjnl/bxl023
Security Considerations and Key Negotiation Techniques for Power Constrained Sensor Networks
B. Doyle (2006)
10.1109/PERCOMW.2006.121
Secure cooperative channel establishment in wireless sensor networks
M. Conti (2006)
10.1109/ARES.2006.6
A framework of survivability model for wireless sensor network
D. Kim (2006)
10.1007/11767480_25
Combinatorial Structures for Design of Wireless Sensor Networks
Dibyendu Chakrabarti (2006)
10.1109/ICDCS.2007.131
Resilient Cluster Formation for Sensor Networks
D. Liu (2007)
Secure Differential Data Aggregation for Wireless Sensor Networks
H. Çam (2004)
10.1007/978-0-387-72367-9_14
Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks
T. Moore (2007)
10.1016/j.jpdc.2007.05.009
Decentralized key generation scheme for cellular-based heterogeneous wireless ad hoc networks
A. Gupta (2007)
10.31274/ETD-180810-1232
Verifying sensor network security protocol implementations
Youssef Hanna (2008)
10.1016/j.adhoc.2012.03.019
LNT: A logical neighbor tree secure group communication scheme for wireless sensor networks
O. Cheikhrouhou (2012)
Computation and Data Decomposition Algorithm Supporting Data Reorganization Communication
Dong Chun-li (2007)
10.1109/PERCOMW.2007.56
Identity-Based Encryption for Sensor Networks
Leonardo B. Oliveira (2007)
10.1109/IPDPS.2004.1303251
Efficient and resilient key discovery based on pseudo-random key pre-deployment
R. Pietro (2004)
10.1145/1653760.1653764
Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks
S. Ruj (2010)
Efficient, Reliable and Secure Distributed Protocols for MANETs.
S. Reidt (2010)
KEY PRE-DISTRIBUTION USING UNITAL DESIGN FOR WIRELESS SENSOR NETWORK 1
V. Naresh (2014)
Energy-rate based MAC protocol for wireless sensor networks and key pre-distribution schemes
R. Kalidindi (2005)
10.1109/ICESS.2008.44
An Improved Matrix Key Pre-distribution Scheme for Wireless Sensor Networks
Ni Chen (2008)
Addressing Unique Control System Concerns in Wireless Networks: Processor Based Denial of Service Attacks and Recovering from Key Compromise
Kun Sun (2010)
Multi-Level microTESLA: A Broadcast Authentication System for Distributed Sensor Networks
D. Liu (2003)
Study on Dynamic Key Management of Clustered Sensor Networks
H. Wang (2006)
10.1007/11561354_11
A Key Management Scheme for Commodity Sensor Networks
Y. H. Kim (2005)
Security Schemes for the OLSR Protocol for Ad Hoc Networks
D. Rao (2005)
10.1145/1089803.1089976
A study of static versus dynamic keying schemes in sensor networks
M. Moharrum (2005)
10.1109/TIFS.2016.2613841
On Resilience and Connectivity of Secure Wireless Sensor Networks Under Node Capture Attacks
J. Zhao (2017)
10.1016/j.comnet.2016.05.005
A survey of key management schemes in multi-phase wireless sensor networks
Mohamed-Lamine Messai (2016)
10.1002/sec.152
DISA: Detection and isolation of sneaky attackers in locally monitored multi-hop wireless networks
I. Khalil (2013)
10.1145/2069105.2069115
A key management method based on an AVL tree and ECC cryptography for wireless sensor networks
Hayette Boumerzoug (2011)
10.1109/TrustCom.2011.66
A Double Key-Sharing Based False Data Filtering Scheme in Wireless Sensor Networks
Q. Sun (2011)
10.1145/1341731.1341734
Redoubtable Sensor Networks
R. Pietro (2008)
10.1109/GLOCOM.2007.38
Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks
Jing Deng (2007)
See more
Semantic Scholar Logo Some data provided by SemanticScholar