skip to main content
10.1145/1516241.1516339acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

A lightweight key renewal scheme for clustered sensor networks

Published: 15 February 2009 Publication History

Abstract

In sensor networks, sensors are prone to be captured by attackers because they are usually deployed in unattended surroundings. If an adversarial compromises a sensor, he/she uses the keys from the compromised sensor to uncover the keys of others sensors. Therefore, it is very important to renew the keys of sensors in a periodic or reactive manner. Even though many group key renewal schemes for distributed key renewals have been proposed, they expose some flaws. First, they employ a single group key in a cluster so that the compromise of one sensor discloses the group key. Second, they evict the compromised nodes by updating the compromised keys with non-compromised keys. This eviction scheme is useless when the non-compromised keys are exhausted due to the increase of compromised nodes. In this paper, we propose a lightweight key renewal scheme, which evicts the compromised nodes clearly by reforming clusters without compromised nodes. Besides, in a cluster, each member employs a pairwise key for communication with its CH (Cluster Head) so that our scheme is tolerable against sensor compromise. Our simulation results prove that the proposed scheme is more tolerable against the compromise of sensors and it is more energy-saving than the group key renewal schemes.

References

[1]
Landstra, T., Zawodniok, M., Jagannathan, S. 2007. Energy-Efficient Hybrid Key Management Protocol for Wireless Sensor Networks. In Proceedings of the 32nd IEEE Conference on Local Computer Networks, 1009--1016.
[2]
Zhu, S., Setia, S., Jajodia, S. 2003. LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS '03).
[3]
Panja, B., Madria, S., Bhargava, B. 2006. Energy and Comminication Efficient Group Key Management Protocol for Hierarchical Sensor Network. In Proceedings of IEEE Int'l Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06). 384--393.
[4]
Perrig, A., Szewczyk, R., Wen, V., Culler, D., and Tygar, J. D. 2002. SPINS: Security Protocols for Sensor Networks. Wireless Networks. 8, 5, 521--634.
[5]
Chan, H., Perrig, A., and Song, D. 2003. Random Key Predistribution Schemes for Distributed Sensor Networks. In Proceedings of IEEE Symp. on Security and Privacy, Berkeley, CA, 197--213.
[6]
Du., W., Deng, J., Han, Y. S, Chen, S., and Varshney, P. 2004. A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In Proceedings of IEEE Infocom '04, 586--597.
[7]
Liu, D., Ning, P., and Du, W. 2005. Group-Based Key Pre-distribution in Wireless Sensor Networks. In Proceedings of 2005 ACM Workshop on Wireless Security (WiSe 2005), 11--20.
[8]
Traynor, P., Choi, H., Cao, G., Zhu, S., and Porta, T. L. 2006. Establishing Pair-wise Keys in Heterogeneous Sensor Networks. In Proceedings of IEEE Infocom '06.
[9]
Eschenauer, L. and Gilgor, V. D. 2002. A Key Management Scheme for Distributed Sensor Networks. In Proceedings of 9th ACM Conference on Computer and Communication Security, 41--47.
[10]
Eltoweissy, M., Moharrum, M., and Mukkamala, R. 2006. Dynamic Key Management in Sensor Networks. IEEE Communications Magazine. 44, 4, 122--130.
[11]
Jolly., G., Kuscu, M. C., Kokate, P., and Younis, M. 2003. A Low-Energy Key Management Protocol for Wireless Sensor Networks. In Proceedings of IEEE Int'l Symp. on Computer and Communication (ISCC '03), 335--340.
[12]
Eltoweissy, M., Heydari, M. H., Moralez, L., and Sudbrough, I. H. 2004. Combinatorial Optimization of Group Key Management. Journal of Network and Systems Management. 12, 1, 33--44.
[13]
Eltoweissy, M., Wadda, A., Olariu, S., and Wilson, L. 2004. Group Key Management Scheme for Large-Scale Sensor Networks. Ad Hoc Networks. 3, 5, 668--688.
[14]
Younis, M., Ghumman, K., and Eltoweissy, M. 2006. Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks. IEEE Tans. on Parallel and Distributed Systems. 17, 8, 865--882.
[15]
Bhuse V. and Gupta, A. 2006. Anomaly Intrusion Detection in Wireless Sensor Networks. Journal of High Speed Networks. 15, 1, 33--51.
[16]
Wang, G. and Cho, G. Pairwise Key Establishments without Key Pre-distribution for Mobile Ad hoc Network Environment. IEE Proceedings Communications. 153, 6, 822--827.
[17]
Heinzelman, W., Chandrakasan, A. P., and Balakrishnan, H. 2002. An Application-Specific Protocol Architecture for Wireless Microsensor Networks. IEEE Trans. on Wireless Communications. 1, 4, 660--670.
[18]
Karlof, C. and Wagner, D. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. In Proceedings of the 1st IEEE Workshop on Sensor Network Protocols and Applications, May. 2003, pp. 113--127

Cited By

View all
  • (2016)A Secure Path Generation Scheme for Real-Time Green Internet of ThingsSecurity and Privacy in Internet of Things (IoTs)10.1201/b19516-21(409-459)Online publication date: 7-Apr-2016
  • (2012)A novel key management scheme for wireless embedded systemsACM SIGAPP Applied Computing Review10.1145/2188379.218838412:1(50-59)Online publication date: 1-Apr-2012
  • (2011)A half-key key management scheme for wireless sensor networksProceedings of the 2011 ACM Symposium on Research in Applied Computation10.1145/2103380.2103433(255-260)Online publication date: 2-Nov-2011
  • Show More Cited By

Index Terms

  1. A lightweight key renewal scheme for clustered sensor networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ICUIMC '09: Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
      February 2009
      704 pages
      ISBN:9781605584058
      DOI:10.1145/1516241
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 15 February 2009

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. key management
      2. security
      3. wireless sensor networks

      Qualifiers

      • Research-article

      Conference

      ICUIMC '09
      Sponsor:

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 13 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2016)A Secure Path Generation Scheme for Real-Time Green Internet of ThingsSecurity and Privacy in Internet of Things (IoTs)10.1201/b19516-21(409-459)Online publication date: 7-Apr-2016
      • (2012)A novel key management scheme for wireless embedded systemsACM SIGAPP Applied Computing Review10.1145/2188379.218838412:1(50-59)Online publication date: 1-Apr-2012
      • (2011)A half-key key management scheme for wireless sensor networksProceedings of the 2011 ACM Symposium on Research in Applied Computation10.1145/2103380.2103433(255-260)Online publication date: 2-Nov-2011
      • (2011)A Key Renewal Model for Wireless Sensor Network Under Node Capture AttackProceedings of the 2011 Fourth International Conference on Emerging Trends in Engineering & Technology10.1109/ICETET.2011.18(301-305)Online publication date: 18-Nov-2011

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media