Key Distribution Strategy of Wireless Sensor Network Based on Multi-Hash Chain

Authors

  • Peng Xiong School of Electronics and Information, Shang hai Dianji University, Shanghai China
  • Qinggang Su Chinesisch-Deutsche Kolleg für Intelligente Produktion, Shanghai Dianji University, Shanghai China https://orcid.org/0000-0001-6111-4886

DOI:

https://doi.org/10.13052/jwe1540-9589.2037

Keywords:

Wireless sensor network, key pre-distribution, pairwise key, hash chain

Abstract

Key management is the basis of the security mechanism for wireless sensor networks and services, and random key pre-distribution is the most effective key management mechanism at present. However, there is a potential challenge to most current random key pre-distribution strategies: it is difficult to achieve both ideal network security connectivity and network survivability. In this paper, we present a novel random key pre-distribution scheme based on the hash chain. By adjusting certain system parameters, such as the hash chain length, the number of common auxiliary nodes and the number of hash chains, a sensor node only need to preload a few of keys, making it possible to establish the pairwise key with high probability among its neighboring nodes. The proposed scheme can still maintain strong network survivability even if there are many compromised nodes. The theoretical analysis and simulation experiments show that the proposed scheme is not only effective and secure, but also scalable.

Downloads

Download data is not yet available.

Author Biographies

Peng Xiong, School of Electronics and Information, Shang hai Dianji University, Shanghai China

Peng Xiong, received the B.Sc. degree and M.Sc. degree in Electrical Engineering from Nanchang University China in 1998 and 2004, respectively, and Ph.D. degree in Computer science and technology from East China Normal University China in 2009. From 2010 on, he is a faculty member in the school of electronic information, Shanghai Dianji University China. He is a member of China Computer Federation (CCF), and his research is currently focused on network secure, wireless networks, cloud computing and big data etc.

Qinggang Su, Chinesisch-Deutsche Kolleg für Intelligente Produktion, Shanghai Dianji University, Shanghai China

Qinggang Su, received the B.Sc. degree in Computer Science from Anhui University of Technology in 2002, and got the M.Sc. degree in Communication Engineering in Shanghai Jiao Tong University, and is studying for Ph.D. degree at East China Normal University. He became a faculty member in the school of electronic information, Shanghai Dianji University China from 2002, and he is rhe vice dean of Chinesisch-Deutsche Kolleg für Intelligente Produktion of Shanghai Dianji University now. He is a member of China Computer Federation (CCF), and his research is currently focused on wireless networks, 5G application and smart manufacturing.

References

Akyildiz F, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor network: A survey. Computer Networks, 38(4): 393–422, 2002.

K.M. Martin and M. Paterson. An application-oriented framework for wireless sensor network key establishment. Electronic Notes in Theoretical Computer Science, vol. 192, no. 2, pp. 31–41, 2008.

O. Boyinbode, H. Le, M. Takizawa. A survey on clustering algorithms for wire-less sensor networks. Int. J. Space-Based Situated Comput. 1 (2) (2011) 130–136.

S.K. Gupta, P. Kuila, P.K. Jana. GAR: an energy efficient GA-based routing for wireless sensor networks. In: International Conference on Distributed Computing and Internet Technology 2013, LNCS, vol. 7753, Springer, 2013, pp. 267–277.

P. Kuila, P.K. Jana. An energy balanced distributed clustering and routing algorithm for wireless sensor networks. In: 2012 2nd IEEE International Conference on Parallel Distributed and Grid Computing (PDGC), IEEE, 2012, pp. 220–225.

Deng J, Han R, Mishra S. INSENS: Intrusion-tolerant routing in wireless Sensor Networks. Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS), pp. 32–39, 2003.

Lazos L, Poovendran R. SeRLoc: Secure Range-Independent Localization for Wireless Sensor Networks. Proceedings of the 2004 ACM workshop on Wireless Security (WISE), pp. 21–30, 2004.

Przydatek B, Song D, Perrig A. SIA: Secure Information Aggregation in Sensor Networks. Proceedings of the 1st international Conference on Embedded Networked Sensor Systems, pp. 255–265, 2003.

Crossbow Technology. MICA2: Wireless measurement system. http://www.xbow.com/Products/Product_pdf_files/Wirelesspdf/6020-0042-04_A_MICA2.pdf

Koc KC. High-Speed RSA implementation. RSA Laboratories, Technical Report, TR201, 1994.

Neuman B.C, Tso T. Kerberos: An authentication service for computer networks. IEEE Communications, 1994, 32(9):33–38.

Chan H, Perrig A, PIKE: Peer Intermediaries for Key Establishment in Sensor Networks. Proceedings of 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), pp. 524–535, March 2005.

J.-P. Sheu and J.-C. Cheng. Pair-wise path key establishment in wireless sensor networks. Computer Communications, vol. 30, no. 11–12, pp. 2365–2374, 2007.

C.-L. Chen, Y.-T. Tsai, and T.-F. Shih. A novel key management of two-tier dissemination for wireless sensor network. In Proceedings of the 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS’12), pp. 576–579, Palermo, Italy, July 2012.

K.-A. Shim, Y.-R. Lee, and C.-M. Park. EIBAS: an efficient identity-based broadcast authentication scheme in wireless sensor networks. Ad Hoc Networks, vol. 11, no. 1, pp. 182–189, 2013.

Camtepe S.A, Yener B. Combinatorial design of key distribution mechanisms for wireless sensor networks. Proceedings of the Computer Security—ESORICS. Berlin: Springer-Verlag, 2004. 293–308.

Eschenauer L, Gligor V. A Key Management Scheme for Distributed Sensor Networks. Proceedings of 9th ACM Conference on Computer and Communications security, pp. 41–47, 2002.

Chan H, Perrig A, Song D. Random Key Pre-Distribution Schemes for Sensor Networks. Proceedings of IEEE Symposium on Security and Privacy, pp. 197–213, 2003.

C.-T. Li, C.-Y. Weng, C.-C. Lee, C.-W. Lee. Towards secure and dynamic password-based user authentication scheme in hierarchical wireless sensor networks. Int. J. Secur. Appl. 7(3) (2013) 249–258.

J. Kim, D. Lee, W. Jeon, Y. Lee, D. Won. Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks. Sensors 14(4) 6443–6462, 2014.

Traynor P, Choi H, Cao G, Zhu S, Porta T. L. Establishing Pairwise Keys in Heterogeneous Sensor Networks. Proceedings of 25th IEEE Conference on Computer Communications (INFOCOM), pp. 52–91, April 2006.

Liu D, Ning P. Location-based Pairwise Key Establishments for Static Sensor Networks. Proceedings of the 1st ACM workshop on Security of Ad hoc and Sensor Networks, pp. 72–82, 2003.

R. Stoleru, H. Wu, and H. Chenji. Secure neighbor discovery and wormhole localization in mobile ad hoc networks. Ad Hoc Networks, vol. 10, no. 7, pp. 1179–1190, 2012.

Du W., Deng J., Han Y.S., Chen S. Varshney P.K. A key management scheme for wireless sensor networks using deployment knowledge, Proceedings of the IEEE INFOCOM. Piscataway: IEEE Press, 2004. 586–597.

Malan DJ, Welsh M, Smith MD. A Public-Key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography. Proceedings of IEEE Sensor and Ad Hoc Communications and Networks (SECON), pp. 71–80, October. 2004.

Uhsadel L, Poschmann A, Paar C. Enabling Full-Size Public-Key Algorithms on 8-bit Sensor Nodes. Proceedings of Fourth European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS), pp. 73–86, July, 2007.

Cressie N. Statistics for Spatial Data, John Wiley & Sons, 1993.

Published

2021-06-09

Issue

Section

Articles