Key management for long-lived sensor networks in hostile environments

被引:16
|
作者
Chorzempa, Michael [1 ]
Park, Jung-Min [1 ]
Eltoweissy, Mohamed [1 ]
机构
[1] Virginia Polytech Inst & State Univ, Bradley Dept Elect & Comp Engn, Blacksburg, VA 24061 USA
关键词
sensor networks; key management; survivability; clustering; security; hostile environments;
D O I
10.1016/j.comcom.2007.02.022
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Large-scale wireless sensor networks (WSNs) are highly vulnerable to attacks because they consist of numerous resource-constrained devices and communicate via wireless links. These vulnerabilities are exacerbated when WSNs have to operate unattended in a hostile environment, such as battlefields. In such an environment, an adversary poses a physical threat to all the sensor nodes, that is, an adversary may capture any node compromising critical security data including keys used for confidentiality and authentication. Consequently, it is necessary to provide security services to these networks to ensure their survival. We propose a novel self-organizing key management scheme for large-scale, and long-lived WSNs, called Survivable and Efficient Clustered Keying (SECK) that provides administrative services that ensures the survivability of the network. SECK is suitable for managing keys in a hierarchical WSN consisting of low-end sensor nodes clustered around more capable gateway nodes. Using cluster-based administrative keys, SECK provides five efficient security administration mechanisms: (1) clustering and key setup, (2) node addition, (3) key renewal, (4) recovery from multiple node captures, and (5) re-clustering. All of these mechanisms have been shown to localize the impact of attacks and considerably improve the efficiency of maintaining fresh session keys. Using simulation and analysis, we show that SECK is highly robust against node capture and key compromise while incurring low communication and storage overhead. (C) 2007 Elsevier B.V.. All rights reserved.
引用
收藏
页码:1964 / 1979
页数:16
相关论文
共 50 条
  • [1] An Efficient Key Management Scheme for Wireless Sensor Networks in Hostile Environments
    Zhang, Jianmin
    Cui, Qingmin
    Liu, Xiande
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 417 - +
  • [2] Node Reclamation and Replacement for Long-lived Sensor Networks
    Tong, Bin
    Wang, Guiling
    Zhang, Wensheng
    Wang, Chuang
    [J]. 2009 6TH ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR, MESH AND AD HOC COMMUNICATIONS AND NETWORKS (SECON 2009), 2009, : 592 - +
  • [3] Node Reclamation and Replacement for Long-Lived Sensor Networks
    Tong, Bin
    Wang, Guiling
    Zhang, Wensheng
    Wang, Chuang
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (09) : 1550 - 1563
  • [4] Two-layered dynamic key management in mobile and long-lived cluster-based wireless sensor networks
    Chuang, I-Hsun
    Su, Wei-Tsung
    Wu, Chun-Yi
    Hsu, Jang-Pong
    Kuo, Yau-Hwang
    [J]. 2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 4148 - +
  • [5] GROUP-BASED KEY MANAGEMENT PROTOCOL FOR ENERGY EFFICIENCY IN LONG-LIVED AND LARGE-SCALE DISTRIBUTED SENSOR NETWORKS
    Paek, Kwang-Jin
    Kim, Jongwan
    Hwang, Chong-Sun
    Lee, SangKeun
    Song, Ui-Sung
    [J]. COMPUTING AND INFORMATICS, 2008, 27 (05) : 743 - 756
  • [6] Towards Reliable Scheduling Schemes for Long-lived Replaceable Sensor Networks
    Tong, Bin
    Li, Zi
    Wang, Guiling
    Zhang, Wensheng
    [J]. 2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [7] Synchronous receiver initiated MAC protocol for long-lived sensor networks
    Boulfekhar, Samra
    Benmohammed, Mohammed
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (02) : 504 - 516
  • [8] PEAS: A robust energy conserving protocol for long-lived sensor networks
    Ye, F
    Zhong, G
    Lu, SW
    Zhang, LX
    [J]. 10TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, PROCEEDINGS, 2002, : 200 - 201
  • [9] PEAS: A robust energy conserving protocol for long-lived sensor networks
    Fan, Y
    Zhong, G
    Cheng, J
    Lu, SW
    Zhang, LX
    [J]. 23RD INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2002, : 28 - 37
  • [10] Robust communications for sensor networks in hostile environments
    Younis, O
    Fahmy, S
    Santi, P
    [J]. 2004 TWELFTH IEEE INTERNATIONAL WORKSHOP ON QUALITY OF SERVICE, 2004, : 10 - 19