skip to main content
10.1145/1089737.1089747acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
Article

Researches on scheme of pairwise key establishment for distributed sensor networks

Published: 13 October 2005 Publication History

Abstract

Security schemes of pairwise key establishment, which enable sensors to communicate with each other securely, play a fundamental role in research on security issue in wireless sensor networks. A new kind of cluster deployed sensor networks distribution model is presented, and based on which, an innovative Hierarchical Hypercube model - H(k,u,m,v,n) and the mapping relationship between cluster deployed sensor networks and the H(k,u,m,v,n) are proposed. By utilizing nice properties of H(k,u,m,v,n) model, a new general framework for pairwise key predistribution and a new pairwise key establishment algorithm are designed, which combines the idea of KDC(Key Distribution Center) and polynomial pool schemes. Furthermore, the working performance of the newly proposed pairwise key establishment algorithm is seriously inspected. Theoretic analysis and experimental figures show that the new algorithm has better performance and provides higher possibilities for sensor to establish pairwise key, compared with previous related works.

References

[1]
L. Eschenauer and V. Gligor. A key-management scheme for distribute sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communication Security. ACM Press, Washington DC, USA, 2002, 41--47.
[2]
H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy. IEEE Computer Society, California, USA, 2003, 197--213.
[3]
C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly-secure key distribution for dynamic conferences. Lecture Notes in Computer Science. 1993, 740, 471--486.
[4]
D. Liu and P. Ning. Establishing pairwise keys in distributed sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security. ACM Press, Washingtion, DC, USA, 2003, 52--61.
[5]
W. Du, J. Deng, Y. Han, and P. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. In Proceedings of the Tenth ACM Conference on Computer and Communications Security. Washingtion, DC, USA,2003, 42--51.
[6]
R. Blom. An optimal class of symmetric key generation systems. Advances in Cryptology: Proceedings of EUROCRYPT 84. Lecture Notes in Computer Science. 1985, 209, :335--338.
[7]
Donggang Liu, Peng Ning, Rongfang Li, Establishing Pairwise Keys in Distributed Sensor Networks. ACM Journal Name, 2004, 20, 1--35.
[8]
L. Fang, W. Du, and N. Peng. A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks, INFOCOM 2005.
[9]
Wang Lei, Lin Ya-ping, Maximum safety path matrix based fault-tolerant routing algorithm for hypercube interconnection network. Journal of software. 2004,15(7), 994--1004.
[10]
Wang Lei, Lin Ya-ping, Maximum safety path vector based fault-tolerant routing algorithm for hypercube interconnection network. Journal of China Institute of Communications. 2004, 16(4), 130--137.
[11]
Lin Ya-ping, Wang Lei, Location information based hierarchical data congregation routing algorithm for sensor networks. Chinese Journal of electronics. 2004, 32(11), 1801--1805.
[12]
W. Heinzelman, J. Kulik, and H. Balakrishnan, Negotiation Based Protocols for Disseminating Information in Wireless Sensor Networks. ACM Wireless Networks. 2002, 8, 169--185.
[13]
Manjeshwar,A.; Agrawal,D.P. TEEN: a routing protocol for enhanced efficiency in wireless sensor networks}. In Proceedings of 15th Parallel and Distributed Processing Symposium}. IEEE Computer Society, San Francisco, USA, 2001, 2009--2015.
[14]
B. Krishnamachari, D. Estrin, and S. Wicker. Modelling Data-Centric Routing in Wireless Sensor Networks. In Proceedings of IEEE Infocom, 2002.

Cited By

View all
  • (2009)A highly resilient and zone-based key predistribution protocol for multiphase wireless sensor networksProceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks10.1145/1641944.1641951(29-36)Online publication date: 28-Oct-2009
  • (2008)A Lightweight Mutual Authentication Scheme for Mobile Radio Frequency IDentification (mRFID) Systems2008 IEEE International Performance, Computing and Communications Conference10.1109/PCCC.2008.4745125(289-296)Online publication date: Dec-2008
  • (2006)Voronoi tessellation based multiscale data compression for sensor networksProceedings of the 5th WSEAS international conference on Telecommunications and informatics10.5555/1974762.1974856(476-486)Online publication date: 27-May-2006

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WMuNeP '05: Proceedings of the 1st ACM workshop on Wireless multimedia networking and performance modeling
October 2005
158 pages
ISBN:159593183X
DOI:10.1145/1089737
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 October 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. hierarchical hypercube model
  2. key pool
  3. key predistribution
  4. pairwise key
  5. sensor networks

Qualifiers

  • Article

Conference

MSWiM05
Sponsor:

Acceptance Rates

WMuNeP '05 Paper Acceptance Rate 18 of 41 submissions, 44%;
Overall Acceptance Rate 36 of 90 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2009)A highly resilient and zone-based key predistribution protocol for multiphase wireless sensor networksProceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks10.1145/1641944.1641951(29-36)Online publication date: 28-Oct-2009
  • (2008)A Lightweight Mutual Authentication Scheme for Mobile Radio Frequency IDentification (mRFID) Systems2008 IEEE International Performance, Computing and Communications Conference10.1109/PCCC.2008.4745125(289-296)Online publication date: Dec-2008
  • (2006)Voronoi tessellation based multiscale data compression for sensor networksProceedings of the 5th WSEAS international conference on Telecommunications and informatics10.5555/1974762.1974856(476-486)Online publication date: 27-May-2006

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media