Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks

被引:26
|
作者
Choi, Jaewoo [1 ]
Bang, Jihyun [1 ]
Kim, LeeHyung [2 ]
Ahn, Mirim [2 ]
Kwon, Taekyoung [1 ]
机构
[1] Yonsei Univ, Grad Sch Informat, Seoul 120749, South Korea
[2] Agcy Def Dev, Seoul 350600, South Korea
来源
IEEE SYSTEMS JOURNAL | 2017年 / 11卷 / 02期
关键词
Insider threats; key revision process; location-based key management; packet drop attack; wireless sensor network (WSN); PREDISTRIBUTION; AGGREGATION;
D O I
10.1109/JSYST.2015.2422736
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To achieve secure communications in wireless sensor networks (WSNs), sensor nodes (SNs) must establish secret shared keys with neighboring nodes. Moreover, those keys must be updated by defeating the insider threats of corrupted nodes. In this paper, we propose a location-based key management scheme for WSNs, with special considerations of insider threats. After reviewing existing location-based key management schemes and studying their advantages and disadvantages, we selected location-dependent key management (LDK) as a suitable scheme for our study. To solve a communication interference problem in LDK and similar methods, we have devised a new key revision process that incorporates grid-based location information. We also propose a key establishment process using grid information. Furthermore, we construct key update and revocation processes to effectively resist inside attackers. For analysis, we conducted a rigorous simulation and confirmed that our method can increase connectivity while decreasing the compromise ratio when the minimum number of common keys required for key establishment is high. When there was a corrupted node leveraging insider threats, it was also possible to effectively rekey every SN except for the corrupted node using our method. Finally, the hexagonal deployment of anchor nodes could reduce network costs.
引用
收藏
页码:494 / 502
页数:9
相关论文
共 50 条
  • [1] VLKM: Virtual Location-Based Key Management Scheme for Wireless Sensor Networks
    Vaid, Rohit
    Katiyar, Vijay
    2014 INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2014, : 53 - 61
  • [2] Location-Based Pairwise Key Predistribution for Wireless Sensor Networks
    Kwon, Taekyoung
    Lee, JongHyup
    Song, JooSeok
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (11) : 5436 - 5442
  • [3] Location-Based Key Management Structure for Secure Group Communication in Wireless Sensor Networks
    Kim, Jin Myoung
    Cho, Tae Ho
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2013, E96B (09) : 2183 - 2189
  • [4] Analysis for Location-based Key Pre-distribution in Wireless Sensor Networks
    Wang Jing
    Xia Luning
    Jing Jiwu
    ICIC 2009: SECOND INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTING SCIENCE, VOL 2, PROCEEDINGS: IMAGE ANALYSIS, INFORMATION AND SIGNAL PROCESSING, 2009, : 297 - +
  • [5] Location-based pairwise key establishment and data authentication for wireless sensor networks
    Yang, Cungang
    Xiao, Jie
    2006 IEEE INFORMATION ASSURANCE WORKSHOP, 2006, : 247 - +
  • [6] On the Impact of Deployment Errors in Location-Based Key Predistribution Protocols for Wireless Sensor Networks
    Kim, Yoonsik
    Lim, Eunji
    Kwon, Taekyoung
    IEEE ACCESS, 2024, 12 : 35765 - 35778
  • [7] Location-based cooperative relaying in wireless sensor networks
    Coronel, Pedro
    Doss, Robin
    Schott, Wolfgang
    2007 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS SOFTWARE & MIDDLEWARE, VOLS 1 AND 2, 2007, : 868 - +
  • [8] Hierarchical Location-Based Services for Wireless Sensor Networks
    Khadim, Rania
    Erritali, Mohammed
    Maaden, Abdelhakim
    2016 13TH INTERNATIONAL CONFERENCE ON COMPUTER GRAPHICS, IMAGING AND VISUALIZATION (CGIV), 2016, : 457 - 463
  • [9] A Location-based Routing Algorithm for Wireless Sensor Networks
    Sammut, Etienne
    Debono, Carl James
    IEEE EUROCON 2015 - INTERNATIONAL CONFERENCE ON COMPUTER AS A TOOL (EUROCON), 2015, : 184 - 188
  • [10] Location-based Skyline Queries in Wireless Sensor Networks
    Shen, Hailan
    Chen, Zhigang
    Deng, Xiaoheng
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS, 2009, : 391 - 395