skip to main content
10.1145/1506270.1506395acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmobilityConference Proceedingsconference-collections
research-article

A location-ID sensitive key establishment scheme in static wireless sensor networks

Published: 10 September 2008 Publication History

Abstract

Sensor networks are usually consist of thousands of resource-limited nodes and are deployed in a designated area without any fixed infrastructure. While the establishment of the pairwise keys between any pair of adjacent nodes to build a secure link remains the main concern in the design of key management protocols, malicious attacks aim at routing information, exhaust node's resource, and compromised secrets can misdirect the data flow or denial the network service with relatively small effort. Many mission-critic sensor network applications demand an effective, light, and flexible algorithm yet robust under attacks.
Based on the LEAP+ scheme, we propose an improved LEAP+ by adding location information into the key establishment phase. By identifying the correctness of the id-location pair, our scheme effectively limits the Sybil attack and mitigates the damage of HELLO flood attack and node cloning attack. We furthermore propose an authentication phase in our scheme to defend possible replay attacks. The analysis shows that our scheme is more robust than LEAP+ with only minor increase of computation overhead.

References

[1]
D. Estrin, M. Srivastava, and A. Sayeed, "Wireless Sensors Networks", MobiCOM Tutorial, no. 5. http://nesl.ee.ucla.edu/tutorials/mobicom02. 2002.
[2]
S. Zhu and S. Setia, "LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks", ACM Transaction On Sensor Networks, vol. 2, No. 9, pp. 500--528, November, 2006.
[3]
L. Eschenauer and V. D. Gligor, "A Key-Management Scheme for Distributed Sensor Networks", Proceedings of the 9th ACM conference on Computer and communications security, pp. 41--47, 2002.
[4]
W. Du, J. Deng, Y. S. Han, and P. K. Varshney, "A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks", Proceedings of the 10th ACM conference on Computer and communications security, pp. 42--51, October, 2003.
[5]
D. Liu and P. Ning, "Location-based pairwise key establishments for static sensor networks", Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pp. 72--82. 2003.
[6]
R. Blom, "An Optimal Class of Symmetric Key Generation Systems", Proceedings of EUROCRYPT'84, Advances in Cryptology, Lecture Notes in Computer Science, vol. 209, pp. 335--338, 1984.
[7]
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, "Spins: Security Protocols for Sensor Networks", In Proceedings of ACM Wireless Networks, vol. 8, pp. 521--534, September, 2002.
[8]
M. F. Younis and M. Eltoweissy, "Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks", IEEE Transaction On Parallel and Distributed Systems, vol. 17, issue: 8, pp. 865--882, August, 2006.
[9]
D. Huang, M. Mehta, D. Medhi, and L. Harn, "Location-Aware Key Management Scheme for Wireless Sensor Networks", Proceedings of Second ACM Workshop Security of Ad Hoc and Sensor Networks (SASN '04), October, 2004.
[10]
C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly Secure Key Distribution for Dynamic Conferences", Proceedings of CRYPTO'92, Advances in Cryptology, Lecture Notes in Computer Science, vol. 740, pp. 471--486, 1993.
[11]
O. Goldreich, S. Goldwasser, S. Micali, "How to Construct Random Functions", Journal of the ACM, vol. 33, no. 4, p. 792--807, 1986.

Index Terms

  1. A location-ID sensitive key establishment scheme in static wireless sensor networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      Mobility '08: Proceedings of the International Conference on Mobile Technology, Applications, and Systems
      September 2008
      689 pages
      ISBN:9781605580890
      DOI:10.1145/1506270
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 10 September 2008

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. HELLO flood attack
      2. location-based key establishment
      3. node cloning
      4. sybil attack

      Qualifiers

      • Research-article

      Funding Sources

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 162
        Total Downloads
      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 19 Feb 2025

      Other Metrics

      Citations

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media