A novel key distribution scheme against storage-bounded adversaries using attack probabilities

A novel key distribution scheme against storage-bounded adversaries using attack probabilities

Key establishment proves to be a challenging problem in wireless sensor networks. A key establishment scheme needs to incorporate properties like scalability and energy efficiency. We propose a scheme that, besides enjoying a desirable scalability, consumes resources according to attack probability within each region. In this scheme, the distribution area is divided into regions of varying attack probability. It is assumed that the adversary is storage bounded and that not all communications can be stored by the adversary. This scheme is highly resistant to node compromises and there is an extremely low probability of discovering the key by the adversary in the case of eavesdropping. The results of probabilistic analysis and simulation analysis suggest that the scheme provides desirable efficiency and that the level of energy consumed by the scheme remains constant, regardless of changes in the size of the network.

___

  • [1] Yavuz A, Alagoz F, Anarim E. A new multi-tier adaptive military MANET security protocol using hybrid cryptography and signcryption. Turk J Elec Eng & Comp Sci 2010; 18: 1-21.
  • [2] Bahsi H, Levi A. k -anonymity based framework for privacy preserving data collection in wireless sensor networks. Turk J Elec Eng & Comp Sci 2010; 18: 241-271.
  • [3] Cachin C, Maurer U. Unconditional security against memory-bounded adversaries. Security and communication networks In: Advances in Cryptology-CRYPTO’97; 17–21 Aug 1997; Heidelberg, Germany: Springer. pp. 292-306.
  • [4] Chen C, Chao H. A survey of key distribution in wireless sensor networks. Security and Communication Networks 2011; 7: 2495-2508.
  • [5] Zhang J, Varadharajan J. Wireless sensor network key management survey and taxonomy. J Netw Comput Appl 2010; 33: 63-75.1020
  • [6] Blom R. An optimal class of symmetric key generation systems. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT); Jan 1985; Heidelberg, Germany:Springer. pp. 335-338.
  • [7] Blundo C, Santis AD, Herzberg A, Kutten S, Vaccaro U, Yung M. Perfectly-secure key distribution for dynamic conferences. In: Proceedings of the 29th International Cryptology Conference (CRYPTO); Jan 1993; Heidelberg, Germany: Springer. pp. 471-486.
  • [8] Eschenauer L, Gligor V. A key-management scheme for distributed sensor networks. In: Proceedings of the Annual ACM Computer and Communications Security (CCS); Nov 2002; New York, NY, USA: ACM. pp. 41-47.
  • [9] Deng J, Han YS. Babel: using a common bridge node to deliver multiple keys in wireless sensor networks. In: Proceedings of IEEE Global Telecommunications Conference (GLOBECOM); 26–30 Nov 2007; Washington, DC,USA: IEEE. pp. 161-165.
  • [10] Zhang W, Tran M, Zhu S, Cao G. A random perturbation-based scheme for pairwise key establishment in sensor networks. In: Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc); 9–14 Sep 2007; Montreal, QC, Canada: ACM. pp. 90-99.
  • [11] Yu C, Lu C, Kuo S. Noninteractive key establishment scheme for sensor networks. IEEE T Inf Foren Sec 2010; 5: 556-569.
  • [12] Fan X, Gong G. LPKM: a lightweight polynomial-based key management protocol for distributed wireless sensor network. LCIS Soc Infor Telecommun Eng 2013; 111: 180-190.
  • [13] Chan S, Poovendran R, Sun M. A key management scheme in distributed sensor networks using attack probabilities. In: IEEE Global Communications Conference, Exhibition & Industry Forum (Globecom); 28 Nov–2 Dec 2005; St.Louis, MO, USA: IEEE. pp. 5-12.
  • [14] Rezaeirad M, Orooji M, Mazloom S, Perkins D, Bayoumi M. A novel clustering paradigm for key pre-distribution: toward a better security in homogenous WSNs. In: Consumer Communications and Networking Conference (CCNC); 11–14 Jan 2013; Las Vegas, NV; USA: IEEE. pp. 308-316.
  • [15] Yu C, Li C, Lu C, Kuo S. An application-driven attack probability-based deterministic pairwise key pre-distribution scheme for non-uniformly deployed sensor networks. International Journal of Sensor Networks 2011; 9: 89-106.
  • [16] Tsai S, Tzeng W, Zhou K. Key establishment schemes against storage-bounded adversaries in wireless sensor networks. IEEE T Wirel Comm 2009; 8: 1218-1222.
  • [17] Lee H, Lee K, Shin Y. An Enhanced Key Distribution Scheme for the Energy Consumption and the Security in the Wireless Sensor Networks. In: 10th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT); 19–23 July 2010; Seoul, Korea: IEEE. pp. 157-160.
Turkish Journal of Electrical Engineering and Computer Sciences-Cover
  • ISSN: 1300-0632
  • Yayın Aralığı: Yılda 6 Sayı
  • Yayıncı: TÜBİTAK
Sayıdaki Diğer Makaleler

Performance evaluation of a new efficient H.264 intraprediction scheme

Sara HAMDY, Mostafa IBRAHIM, Mohamed OSMAN

A novel approach of design and analysis of fractal antenna using a neurocomputational method for reconfigurable RF MEMS antenna

Paras CHAWLA, Rajesh KHANNA

Walsh series modeling and estimation in sensorless position control of electrical drives

Hamidreza SHIRAZI, Jalal NAZARZADEH

Site-specific design optimization of horizontal-axis wind turbine systems using PSO algorithm

Ulaş EMİNOĞLU

A parametric study on privatization revenues of the electricity distribution companies in Turkey

Selim AY, Ercan İZGİ

Design and implementation of a man-overboard emergency discovery system based on wireless sensor networks

Cüneyt BAYILMIŞ, Hüseyin EKİZ, Abdullah SEVİN, İsmail ERTŞRK, Ahmet KARACA

Bone age determination in young children (newborn to 6 years old) using support vector machines

Harun UĞUZ, Ömer Kaan BAYKAN, Gür Emre GÜRAKSIN

Computation of the scattered fields from an arbitrary discontinuity on a perfectly conducting ground plane by a decomposition method

Ahmet KIZILAY, Uğur SAYNAK

Behavior characteristics of a cap-resistor, memcapacitor, and a memristor from the response obtained of RC and RL electrical circuits described by fractional differential equations

Jos´e Francisco AGUILAR GOMEZ

Modeling and control of a doubly fed induction generator with a disturbance observer: a stator voltage oriented approach

Metin GÖKAŞAN, Edin GOLUBOVIC, Asıf SABANOVIC, Seta BOGOSYAN, Eşref Emre ÖZSOY