Abstract
Key pre-distribution techniques for sensing data security provision of wireless sensor networks (WSNs) have attracted much more attention and been studied extensively. But most of these schemes are not scalable due to their linearly increased communication and key storage overhead. Furthermore, existing protocols cannot provide sufficient security when the number of compromised nodes exceeds a critical value. To address these limitations, we propose a hierarchical composition of LU matrix-based key distribution scheme for sensor networks. Our scheme guarantees that two communicating parties can establish a unique pairwise key between them and allows mutual authentication. Compared with existing protocols, our scheme has better performance in terms of network resilience, associated overhead and scalability.
This work is supported by SRFDP of China under grant 20050248043.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceeding of the 9th ACM Conference on Computer and Communication security, pp. 41–47 (2002)
Chan, H., Perrig, A., Song, D.: Random key pre-distribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, pp. 197–213 (2003)
Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A pairwise key pre-distribution scheme for wireless sensor networks. ACM Transation on Information and System Security, 228–258 (2005)
Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. ACM Transactions on Information and System Security 8(1), 41–77 (2005)
Camtepe, S.A., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 293–308. Springer, Heidelberg (2004)
Lee, J., Stinson, D.R.: A combinatorial approach to key predistribution for distributed sensor networks. In: Proc. of IEEE Wireless Communications and Networking Conference (WCNC 2005), New Orleans, LA, USA (2005)
Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119–132. Springer, Heidelberg (2004)
Park, C.W., Choi, S.J., Youn, H.Y.: A Noble Key Pre-distribution Scheme with LU Matrix for Secure Wireless Sensor Networks. In: Hao, Y., Liu, J., Wang, Y.-P., Cheung, Y.-m., Yin, H., Jiao, L., Ma, J., Jiao, Y.-C. (eds.) CIS 2005. LNCS (LNAI), vol. 3802, pp. 494–499. Springer, Heidelberg (2005)
Choi, S.J., Youn, H.Y.: A Novel Data Encryption and Distribution Approach for High Security and Availability Using LU Decomposition. In: Laganà , A., Gavrilova, M., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3046, pp. 637–646. Springer, Heidelberg (2004)
Jolly, G., Kuscu, M.C., Kokate, P., Yuonis, M.: A low-energy management protocol for wireless sensor networks. In: Proceedings of the Eighth IEEE International Symposium on Computers and Communication (ISCC 2003), Kemer-Antalya, Turkey (June 30-July 3 2003)
Shaneck, M., Mahadevan, K., Kher, V., Kim, Y.: Software-Based Attestation for Wireless Sensors. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 27–41. Springer, Heidelberg (2005)
Wang, G., Zhang, W., Cao, G., La Porta, T.: On Supporting Distributed Collaboration in Sensor networks. In: IEEE Military Communications Conference (MILCOM) (October 2003)
Perrig, A., Canetti, R., Tygar, J.D., Song, D.: The Tesla Broadcast Authentication Protocol. RSA CryptoBytes 5 (2002)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wen, M., Zheng, Y., Li, H., Chen, K. (2007). A Hierarchical Composition of LU Matrix-Based Key Distribution Scheme for Sensor Networks. In: Washio, T., et al. Emerging Technologies in Knowledge Discovery and Data Mining. PAKDD 2007. Lecture Notes in Computer Science(), vol 4819. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77018-3_60
Download citation
DOI: https://doi.org/10.1007/978-3-540-77018-3_60
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77016-9
Online ISBN: 978-3-540-77018-3
eBook Packages: Computer ScienceComputer Science (R0)