A novel key distribution scheme against storage-bounded adversaries using attack probabilities
A novel key distribution scheme against storage-bounded adversaries using attack probabilities
Key establishment proves to be a challenging problem in wireless sensor networks. A key establishment scheme needs to incorporate properties like scalability and energy efficiency. We propose a scheme that, besides enjoying a desirable scalability, consumes resources according to attack probability within each region. In this scheme, the distribution area is divided into regions of varying attack probability. It is assumed that the adversary is storage bounded and that not all communications can be stored by the adversary. This scheme is highly resistant to node compromises and there is an extremely low probability of discovering the key by the adversary in the case of eavesdropping. The results of probabilistic analysis and simulation analysis suggest that the scheme provides desirable efficiency and that the level of energy consumed by the scheme remains constant, regardless of changes in the size of the network.
___
- [1] Yavuz A, Alagoz F, Anarim E. A new multi-tier adaptive military MANET security protocol using hybrid cryptography and signcryption. Turk J Elec Eng & Comp Sci 2010; 18: 1-21.
- [2] Bahsi H, Levi A. k -anonymity based framework for privacy preserving data collection in wireless sensor networks. Turk J Elec Eng & Comp Sci 2010; 18: 241-271.
- [3] Cachin C, Maurer U. Unconditional security against memory-bounded adversaries. Security and communication networks In: Advances in Cryptology-CRYPTO97; 1721 Aug 1997; Heidelberg, Germany: Springer. pp. 292-306.
- [4] Chen C, Chao H. A survey of key distribution in wireless sensor networks. Security and Communication Networks 2011; 7: 2495-2508.
- [5] Zhang J, Varadharajan J. Wireless sensor network key management survey and taxonomy. J Netw Comput Appl 2010; 33: 63-75.1020
- [6] Blom R. An optimal class of symmetric key generation systems. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT); Jan 1985; Heidelberg, Germany:Springer. pp. 335-338.
- [7] Blundo C, Santis AD, Herzberg A, Kutten S, Vaccaro U, Yung M. Perfectly-secure key distribution for dynamic conferences. In: Proceedings of the 29th International Cryptology Conference (CRYPTO); Jan 1993; Heidelberg, Germany: Springer. pp. 471-486.
- [8] Eschenauer L, Gligor V. A key-management scheme for distributed sensor networks. In: Proceedings of the Annual ACM Computer and Communications Security (CCS); Nov 2002; New York, NY, USA: ACM. pp. 41-47.
- [9] Deng J, Han YS. Babel: using a common bridge node to deliver multiple keys in wireless sensor networks. In: Proceedings of IEEE Global Telecommunications Conference (GLOBECOM); 2630 Nov 2007; Washington, DC,USA: IEEE. pp. 161-165.
- [10] Zhang W, Tran M, Zhu S, Cao G. A random perturbation-based scheme for pairwise key establishment in sensor networks. In: Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc); 914 Sep 2007; Montreal, QC, Canada: ACM. pp. 90-99.
- [11] Yu C, Lu C, Kuo S. Noninteractive key establishment scheme for sensor networks. IEEE T Inf Foren Sec 2010; 5: 556-569.
- [12] Fan X, Gong G. LPKM: a lightweight polynomial-based key management protocol for distributed wireless sensor network. LCIS Soc Infor Telecommun Eng 2013; 111: 180-190.
- [13] Chan S, Poovendran R, Sun M. A key management scheme in distributed sensor networks using attack probabilities. In: IEEE Global Communications Conference, Exhibition & Industry Forum (Globecom); 28 Nov2 Dec 2005; St.Louis, MO, USA: IEEE. pp. 5-12.
- [14] Rezaeirad M, Orooji M, Mazloom S, Perkins D, Bayoumi M. A novel clustering paradigm for key pre-distribution: toward a better security in homogenous WSNs. In: Consumer Communications and Networking Conference (CCNC); 1114 Jan 2013; Las Vegas, NV; USA: IEEE. pp. 308-316.
- [15] Yu C, Li C, Lu C, Kuo S. An application-driven attack probability-based deterministic pairwise key pre-distribution scheme for non-uniformly deployed sensor networks. International Journal of Sensor Networks 2011; 9: 89-106.
- [16] Tsai S, Tzeng W, Zhou K. Key establishment schemes against storage-bounded adversaries in wireless sensor networks. IEEE T Wirel Comm 2009; 8: 1218-1222.
- [17] Lee H, Lee K, Shin Y. An Enhanced Key Distribution Scheme for the Energy Consumption and the Security in the Wireless Sensor Networks. In: 10th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT); 1923 July 2010; Seoul, Korea: IEEE. pp. 157-160.