TY - GEN
T1 - Path key establishment using multiple secured paths in wireless sensor networks
AU - Li, Guanfeng
AU - Ling, Hui
AU - Znati, Taieb
PY - 2005
Y1 - 2005
N2 - Random key Pre-distribution scheme has been proposed to overcome the memory, computation and energy limits of individual sensor in wireless sensor networks. In this scheme, a ring of keys is randomly drawn from a large key pool and assigned to a sensor. Nodes sharing common keys can communicate securely, path-key needs to be established for those nodes who do not share any common keys. However, there is no hard security guarantee for path key set up in existing protocols. In this paper, we propose two new methods to discover multiple secure proxies and a scheme to secure path key establishment using secure proxies discovered. We show both from analysis and simulation that our scheme can achieve a high level of security against node capture based on the network parameters the user has chosen, meanwhile only incurring a small amount of overhead. All path keys established in our scheme is exclusively known by two end nodes with high probability.
AB - Random key Pre-distribution scheme has been proposed to overcome the memory, computation and energy limits of individual sensor in wireless sensor networks. In this scheme, a ring of keys is randomly drawn from a large key pool and assigned to a sensor. Nodes sharing common keys can communicate securely, path-key needs to be established for those nodes who do not share any common keys. However, there is no hard security guarantee for path key set up in existing protocols. In this paper, we propose two new methods to discover multiple secure proxies and a scheme to secure path key establishment using secure proxies discovered. We show both from analysis and simulation that our scheme can achieve a high level of security against node capture based on the network parameters the user has chosen, meanwhile only incurring a small amount of overhead. All path keys established in our scheme is exclusively known by two end nodes with high probability.
KW - Cryptography
KW - Key pre-distribution
KW - Multiple path
KW - Sensor network
UR - http://www.scopus.com/inward/record.url?scp=77952409570&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77952409570&partnerID=8YFLogxK
U2 - 10.1145/1095921.1095928
DO - 10.1145/1095921.1095928
M3 - Conference contribution
AN - SCOPUS:77952409570
SN - 159593197X
SN - 9781595931979
T3 - CoNEXT 2005 - Proceedings of the 2005 ACM Conference on Emerging Network Experiment and Technology
SP - 43
EP - 49
BT - CoNEXT 2005 - Proceedings of the 2005 ACM Conference on Emerging Network Experiment and Technology
T2 - 1st International Conference on Emerging Networking Experiments and Technologies, CoNEXT'05
Y2 - 24 October 2005 through 27 October 2005
ER -