• Article
  • | |
  • Metrics
  • |
  • Reference [20]
  • |
  • Related
  • |
  • Cited by [1]
  • | |
  • Comments
    Abstract:

    This paper proposes a key management scheme using time-based deployment for wireless sensor networks, which is characterized by a special two-tier random key pre-distribution and elimination mechanism as well as a time-based group deployment method. Each sensor node randomly chooses keys from multiple key pools and deletes related keys when certain conditions are satisfied; All the sensor nodes are organized into deployment groups and are chronologically deployed into the network. Compared with classical key management schemes for wireless sensor networks, The proposed scheme increases node resource efficiency and enhances network resilience against node compromise while ensuring a relatively high node connectivity for pair-wise key generation.

    Reference
    [1] Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. A Survey on Sensor Networks. IEEE Communications Magazine, 2002,40(8):102?114.
    [2] Su Z, Lin C, Feng FJ, Ren FY. Key management schemes and protocols for wireless sensor networks. Journal of Software,2007,18(5):1218?1231 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/18/1218.htm
    [3] Crossbow Technology. Product feature reference: Sensors and functions. http://www.xbow.com/Products/Product_pdf_files/Wireless_pdf/Product_Feature_Reference_Chart.pdf
    [4] Diffie W, Hellman ME. New directions in cryptography. IEEE Trans. on Information Theory, 1976,22(6):644?654.
    [5] Rivest RL, Shamir A, Adleman LM. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 1978,21(2):120?126.
    [6] Neuman BC, Tso T. Kerberos: An authentication service for computer networks. IEEE Communications Magazine, 1994,32(9):33?38.
    [7] Anjum F, Mouchtaris P. Security for Wireless Ad Hoc Networks. John Wiley Publications, 2007.
    [8] Eschenauer L, Gligor VD. A Key-Management scheme for distributed sensor networks. In: Proc. of the 9th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2002. 41?47.
    [9] Chan H, Perrig A, Song D. Random key predistribution schemes for sensor networks. In: Proc. of the 2003 IEEE Symp. on Security and Privacy. Washington: IEEE Computer Society, 2003. 197?213.
    [10] Du W, Deng J, Han YS, Varshney PK. A pairwise key pre-distribution scheme for wireless sensor networks. In: Proc. of the 10th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2003. 42?51.
    [11] Blom R. An optimal class of symmetric key generation systems. In: Proc. of the EUROCRYPT 1984. New York: Springer-Verlag,1984. 335?338.
    [12] Liu D, Ning P. Establishing pairwise keys in distributed sensor networks. In: Proc. of the 10th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2003. 52?61.
    [13] Blundo C, De Santis A, Herzberg A, Kutten S, Vaccaro U, Yung M. Perfectly-Secure key distribution for dynamic conferences. In:Proc. of the CRYPTO 1992. New York: Springer-Verlag, 1993. 471?486.
    [14] Liu D, Ning P. Location-Based pairwise key establishments for static sensor networks. In: Proc. of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks. New York: ACM Press, 2003. 72?82.
    [15] Du W, Deng J, Han YS, Chen S, Varshney PK. A key management scheme for wireless sensor networks using deployment knowledge. In: Proc. of the IEEE INFOCOM. Piscataway: IEEE Press, 2004. 586?597.
    [16] Perrig A, Szewczyk R, Tygar JD, Wen V, Culler DE. SPINS: Security protocols for sensor networks. Wireless Networks, 2002,8(5):521?534.
    [17] Zhu S, Setia S, Jajodia S. LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In: Proc. of the 10th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2003. 62?72.
    [18] Lamport L. Password authentication with insecure communication. Communications of the ACM, 1981,24(11):770?772. [19] Crossbow Technology. MICA2: Wireless measurement system. http://www.xbow.com/Products/Product_pdf_files/Wireless_pdf/MICA2_Datasheet.pdf
    [20] Woo A, Culler DE. A transmission control scheme for media access in sensor networks. In: Proc. of the 7th Annual Conf. on Mobile Computing and Networking. New York: ACM Press, 2001. 221?235.
    附中文参考文献: [2] 苏忠,林闯,封富君,任丰原.无线传感器网络密钥管理的方案和协议.软件学报,2007,18(5):1218?1231. http://www.jos.org.cn/1000-9825/18/1218.htm
    Related
    Comments
    Comments
    分享到微博
    Submit
Get Citation

袁珽,马建庆,钟亦平,张世永.基于时间部署的无线传感器网络密钥管理方案.软件学报,2010,21(3):516-527

Copy
Share
Article Metrics
  • Abstract:5625
  • PDF: 7188
  • HTML: 0
  • Cited by: 0
History
  • Received:March 18,2008
  • Revised:August 28,2008
You are the first2044659Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063