[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1102219.1102233acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

A key pre-distribution scheme for secure sensor networks using probability density function of node deployment

Published: 07 November 2005 Publication History

Abstract

Pairwise key establishment is a fundamental service provided in secure sensor networks. However, due to resource constraints, establishing pairwise keys is not a trivial task. Recently, a random key pre-distribution scheme and its improvements have been proposed. The scheme proposed by Du et al. uses deployment knowledge to improve the performance and security of sensor networks. However, this scheme assumes group-based deployment in which groups of nodes are deployed from horizontal grid points. This assumption limits applications of the scheme. Therefore, in this paper, we propose an advanced key pre-distribution scheme in which different keys are logically mapped to two-dimensional positions, and the keys that are distributed to a node are determined by positions estimated using a node probability density function. The scheme can be applied to any deployment model provided the node probability density function has already been determined. Furthermore, simulation results show that our scheme achieves higher connectivity than Du et al.'s scheme.

References

[1]
D. W. Carman, P. S. Kruus, and B. J. Matt. Constraints and approaches for distributed sensor network security. Technical report, NAI Labs, September 2000.
[2]
H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In Proceedings of the 2003 IEEE Symposium on Security and Privacy, pages 197--213, May 2003.
[3]
W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of the IEEE INFOCOM 2004, pages 586--597, March 2004.
[4]
L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 41--47, November 2002.
[5]
D. Huang, M. Mehta, D. Medhi, and L. Harn. Location-aware key management scheme for wireless sensor networks. In Proceedings of the 2004 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04), pages 29--42, October 2004.
[6]
D. Liu and P. Ning. Location-based pairwise key establishments for static sensor networks. In Proceedings of the 2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03), pages 72--82, October 2003.
[7]
Z. Yu and Y. Guan. A key pre-distribution scheme using deployment knowledge for wireless sensor networks. In Proceedings of the 4th ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN 2005), pages 261--268, April 2005.

Cited By

View all
  • (2023)ZeroProKeS: A Secure Zeroconf Key Establishment Protocol for Large-Scale Low-Cost ApplicationsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.320792720:5(3636-3652)Online publication date: 1-Sep-2023
  • (2018)Key Management Protocols for Smart Sensor NetworksSecurity and Privacy in Smart Sensor Networks10.4018/978-1-5225-5736-4.ch001(1-23)Online publication date: 2018
  • (2018)A hierarchical key pre‐distribution scheme for fog networksConcurrency and Computation: Practice and Experience10.1002/cpe.477631:22Online publication date: 14-Aug-2018
  • Show More Cited By

Index Terms

  1. A key pre-distribution scheme for secure sensor networks using probability density function of node deployment

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SASN '05: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
    November 2005
    136 pages
    ISBN:1595932275
    DOI:10.1145/1102219
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 07 November 2005

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. key management
    2. probabilistic key sharing
    3. sensor networks

    Qualifiers

    • Article

    Conference

    CCS05
    Sponsor:

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 12 Dec 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)ZeroProKeS: A Secure Zeroconf Key Establishment Protocol for Large-Scale Low-Cost ApplicationsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2022.320792720:5(3636-3652)Online publication date: 1-Sep-2023
    • (2018)Key Management Protocols for Smart Sensor NetworksSecurity and Privacy in Smart Sensor Networks10.4018/978-1-5225-5736-4.ch001(1-23)Online publication date: 2018
    • (2018)A hierarchical key pre‐distribution scheme for fog networksConcurrency and Computation: Practice and Experience10.1002/cpe.477631:22Online publication date: 14-Aug-2018
    • (2017)Internet of things securityProceedings of the Second International Conference on Internet of things, Data and Cloud Computing10.1145/3018896.3056784(1-8)Online publication date: 22-Mar-2017
    • (2017)Location-Based Key Management Strong Against Insider Threats in Wireless Sensor NetworksIEEE Systems Journal10.1109/JSYST.2015.242273611:2(494-502)Online publication date: Jun-2017
    • (2016)Key Pre-Distributions From Graph-Based Block DesignsIEEE Sensors Journal10.1109/JSEN.2015.250142916:6(1842-1850)Online publication date: Mar-2016
    • (2016)ECC based self-certified key management scheme for mutual authentication in Internet of Things2016 International Conference on Emerging Technological Trends (ICETT)10.1109/ICETT.2016.7873657(1-6)Online publication date: Oct-2016
    • (2015)An efficient security architecture for Wireless Sensor Networks using pseudo-inverse matrix2015 18th International Conference on Computer and Information Technology (ICCIT)10.1109/ICCITechn.2015.7488103(396-400)Online publication date: Dec-2015
    • (2015)A secret key-based security architecture for wireless sensor networks2015 International Conference on Computer and Information Engineering (ICCIE)10.1109/CCIE.2015.7399322(79-82)Online publication date: Nov-2015
    • (2015)Survey on secure communication protocols for the Internet of ThingsAd Hoc Networks10.1016/j.adhoc.2015.01.00632:C(17-31)Online publication date: 1-Sep-2015
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media