Key Management in Wireless Sensor Networks: Development and Challenges

Article Preview

Abstract:

In wireless sensor network (WSN) security, key management is a big challenge issue as it forms the basic security structure of the networks. Various WSN key management schemes proposed so far attempt to satisfy the security, efficiency and operation requirements under the resource constrain of WSN. In this paper, the constraints of WSN and requirements of key management are discussed. Several key management schemes are presented, analyzed and classified. Finally, some unresolved issues and future works on these schemes are identified. The discussion focuses on efficiency, fault tolerant, influence reduction, dynamic management and cross-layer security.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

654-660

Citation:

Online since:

October 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] D. W. Carman, P. S. Kruus, and B. J. Matt. Constraints and Approaches for Distributed Sensor Security, NAI Labs Tech. Rep. #00-010, (2000).

Google Scholar

[2] N. Sastry and D. Wagner. Security Considerations for IEEE 802. 15. 4 Networks, Proc. 2004 ACM Wksp. Wireless Sec., 2004, pp.32-42.

Google Scholar

[3] G. Yang, W. Chen and X. Cao. Wireless sensor network security, Beijing Science Press. (2010).

Google Scholar

[4] L. Eschenauer and V. D. Gligor. A Key-Management Scheme for Distributed Sensor Networks, Proc. 9th ACM Conf. Comp. and Commun. Sec., 2002, pp.41-47.

DOI: 10.1145/586110.586117

Google Scholar

[5] W. Du, J. Deng, Y. S. Han, S. Chen. A Pairwise Key Predistribution Scheme for Wireless Sensor Networks, Proc. 10th ACM Conf. Comp. Commun. Sec., 2003, pp.42-51.

Google Scholar

[6] R. Blom An Optimal Class of Symmetric Key Generation Systems, " Proc. EUROCRYPT , 84 Wksp. Advances in Cryptology: Theory and App. of Cryptographic Techniques, 1985, pp.335-38.

Google Scholar

[7] M. Steiner, G. Tsudik, M. Waidner, Key Agreement in Dynamic Peer Groups, IEEE Transactions on Parallel and Distributed Systems 11(8): 769-780, (2000).

DOI: 10.1109/71.877936

Google Scholar

[8] B. Panja, S. K. Madria, and B. Bhargava. Energy and Communication Efficient Group Key Management Protocol for Hierarchical Sensor Networks, " SUTC '06: Proc. IEEE Int, l. Conf. Sensor Networks, Ubiquitous, and Trustworthy Comp., 2006, pp.384-93.

DOI: 10.1109/sutc.2006.1636204

Google Scholar

[9] S. Zhu, S. Setia, and S. Jajodia. LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks, Proc. 10th ACM Conf. Comp. and Commun. Sec., 2003, pp.62-72.

DOI: 10.1145/948109.948120

Google Scholar

[10] A. Perrig, R. Szewczyk, J. Tygar, V. Wen, D. Culler. SPINS: Security protocols for sensor networks, ACM Wireless Network, 2002, 8(5): 521-534.

DOI: 10.1023/a:1016598314198

Google Scholar

[11] J. Jang, T. Kwon, J. Song. A time-based key management protocol for wireless sensor networks, Information Security Practice and Experience, (2007) 314-328.

DOI: 10.1007/978-3-540-72163-5_24

Google Scholar

[12] B. Maala, H. Bettahar, and A. Bouabdallah. TLA: A Tow Level Architecture for Key Management in Wireless Sensor Networks, pp.639-644, (2008).

DOI: 10.1109/sensorcomm.2008.36

Google Scholar

[13] C. Kyung, Y. Minjung, C. Kijoon, and K. Mihui. An Enhanced Key Management Using ZigBee Pro for Wireless Sensor Networks, in Information Networking (ICOIN), 2012 International Conference on, 2012, pp.399-403.

Google Scholar

[14] Certicom. Standards for Efficient Cryptography, SEC 1 : Elliptic Curve Cryptography, Ver 1. 0, September (2000).

Google Scholar

[15] ZigBee Alliance, ZigBee-2007 Specification, January (2008).

Google Scholar

[16] M. Younis, K. Ghumman, M. Eltoweissy. Location-Aware combinatorial key management scheme for clustered sensor networks, IEEE Trans. on Parallel and Distribution System, 2006, 17 (8): 865-882.

DOI: 10.1109/tpds.2006.106

Google Scholar

[17] M. Eltoweissy, M. Moharrum, R. Mukkamala. Dynamic key management in sensor networks, IEEE Communications Magazine, 2006, 44(4): 122-130.

DOI: 10.1109/mcom.2006.1632659

Google Scholar

[18] H. Chan, A. Perrig, D. Song. Random key predistribution schemes for sensor networks, In: Proc. of the 2003 IEEE Symp. on Security and Privacy. Washington: IEEE Computer Society, 2003. 197-213.

Google Scholar

[19] D. Liu, P. Ning. Establishing pairwise keys in distributed sensor networks, In: Proc. of the 10th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2003. 52-61.

DOI: 10.1145/948109.948119

Google Scholar

[20] D. Liu, P. Ning. Location-Based pairwise key establishments for static sensor networks, In: Proc. of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks. New York: ACM Press, 2003. 72-82.

DOI: 10.1145/986858.986869

Google Scholar

[21] W. Du, J. Deng, Y. S. Han, S. Chen, P. K. Varshney. A key management scheme for wireless sensor networks using deployment knowledge, In: Proc. of the IEEE INFOCOM. Piscataway: IEEE Press, 2004. 586-597.

DOI: 10.1109/infcom.2004.1354530

Google Scholar

[22] D. Huang, M. Mehta, D. Medhi, L. Harn. Location-Aware key management scheme for wireless sensor networks, In: Proc. of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks. New York: ACM Press, 2004. 29-42.

DOI: 10.1145/1029102.1029110

Google Scholar

[23] H. Chan, A. Perrig. PIKE: Peer intermediaries for key establishment in sensor networks, In: Proc. of the IEEE INFOCOM 2005. Piscataway: IEEE Communication Society, 2005. 524-535.

DOI: 10.1109/infcom.2005.1497920

Google Scholar

[24] S. A. Camtepe, B. Yener. Combinatorial design of key distribution mechanisms for wireless sensor networks, In: Proc. of the Computer Security—ESORICS. Berlin: Springer-Verlag, 2004. 293-308.

DOI: 10.1007/978-3-540-30108-0_18

Google Scholar

[25] J. C. Lee, V. C. M. Leung, K. H. Wong, and J. Cao. Key management issues in wireless sensor networks: current proposals and future developments, IEEE Wireless Communications, vol. 14, pp.76-84 October (2007).

DOI: 10.1109/mwc.2007.4396946

Google Scholar

[26] D. Aguayo, J. Bicket, S. Biswas, G. Judd, and R. Morris. Link-level measurements from an 802. 11b mesh network, In ACM SIGCOMM 2004, August (2004).

DOI: 10.1145/1030194.1015482

Google Scholar

[27] Q. Huang, J. Cukier, H. Kobayashi, B. Liu, J. Zhang. Fast authenticated key establishment protocols for self-organizing sensor networks, " In: Proc. of the 2nd ACM Int, l Conf. on Wireless Sensor Networks and Applications. New York: ACM Press, 2003. 141-150.

DOI: 10.1145/941350.941371

Google Scholar

[28] Z. Su, C. Lin, F. Feng and F. Ren. Key Management Schemes and Protocols for Wireless Sensor Networks, Journal of Software, May 2007, pp.1218-1231.

Google Scholar

[29] X. Huang and M. Yang. Survey on Key Management for Wireless Sensor Networks, Application Research of Computers, March 2007, Vol 24, No. 3, pp.10-15.

Google Scholar