[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

SBK: A Self-Configuring Framework for Bootstrapping Keys in Sensor Networks

Published: 01 July 2008 Publication History

Abstract

Key pre-distribution has been claimed to be the only viable approach for establishing shared keys between neighboring sensors after deployment for a typical sensor network. However, none of the proposed key pre-distribution schemes simultaneously achieves good performance in terms of scalability in network size, key-sharing probability between neighboring sensors, memory overhead for keying information storage, and resilience against node capture attacks. In this paper, we propose SBK, an in-situ self-configuring framework to bootstrap keys in large-scale sensor networks. SBK is fundamentally different compared to all key pre-distribution schemes. It requires no keying information pre-deployment. In SBK, sensors differentiate their roles as either service nodes or worker nodes after deployment. Service sensors construct key spaces, and distribute keying information in order for worker sensors to bootstrap pairwise keys. An improved scheme, iSBK, is also proposed to speed up the bootstrapping procedure. We conduct both theoretical analysis and simulation study to evaluate the performances of SBK and iSBK. To the best of our knowledge, SBK and iSBK are the only key establishment protocols that simultaneously achieve good performance in scalability, key-sharing probability, storage overhead, and resilience against node capture attacks.

Cited By

View all
  • (2017)Using Wireless Link Dynamics to Extract a Secret Key in Vehicular ScenariosIEEE Transactions on Mobile Computing10.1109/TMC.2016.255778416:7(2065-2078)Online publication date: 1-Jul-2017
  • (2013)Energy efficient approach with integrated key management scheme for wireless sensor networksProceedings of the second ACM MobiHoc workshop on Airborne networks and communications10.1145/2491260.2491263(13-18)Online publication date: 29-Jul-2013
  • (2012)Lightweight key management scheme to enhance the security of internet of thingsInternational Journal of Wireless and Mobile Computing10.1504/IJWMC.2012.0467735:2(191-198)Online publication date: 1-May-2012
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Transactions on Mobile Computing
IEEE Transactions on Mobile Computing  Volume 7, Issue 7
July 2008
95 pages

Publisher

IEEE Educational Activities Department

United States

Publication History

Published: 01 July 2008

Author Tags

  1. Network-level security and protection
  2. Security
  3. and protection
  4. integrity

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2017)Using Wireless Link Dynamics to Extract a Secret Key in Vehicular ScenariosIEEE Transactions on Mobile Computing10.1109/TMC.2016.255778416:7(2065-2078)Online publication date: 1-Jul-2017
  • (2013)Energy efficient approach with integrated key management scheme for wireless sensor networksProceedings of the second ACM MobiHoc workshop on Airborne networks and communications10.1145/2491260.2491263(13-18)Online publication date: 29-Jul-2013
  • (2012)Lightweight key management scheme to enhance the security of internet of thingsInternational Journal of Wireless and Mobile Computing10.1504/IJWMC.2012.0467735:2(191-198)Online publication date: 1-May-2012
  • (2011)LBPProceedings of the 5th International Conference on Ubiquitous Information Management and Communication10.1145/1968613.1968679(1-8)Online publication date: 21-Feb-2011
  • (2010)Distributed KDC-based random pairwise key establishment in wireless sensor networksEURASIP Journal on Wireless Communications and Networking10.1155/2010/8087972010(1-14)Online publication date: 1-Feb-2010
  • (2010)Dynamic, non-interactive key management for the bundle protocolProceedings of the 5th ACM workshop on Challenged networks10.1145/1859934.1859951(75-78)Online publication date: 24-Sep-2010
  • (2009)An efficient post-deployment key establishment scheme for heterogeneous sensor networksProceedings of the 28th IEEE conference on Global telecommunications10.5555/1811982.1812270(5370-5375)Online publication date: 30-Nov-2009
  • (2009)In situ key establishment in large-scale sensor networksEURASIP Journal on Wireless Communications and Networking10.1155/2009/4274922009(1-12)Online publication date: 1-Feb-2009
  • (2009)A simple lightweight authentic bootstrapping protocol for IPv6-based low rate wireless personal area networks (6LoWPANs)Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly10.1145/1582379.1582583(937-941)Online publication date: 21-Jun-2009

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media