A pairwise key predistribution scheme for wireless sensor networks
Top Cited Papers
Open Access
- 1 May 2005
- journal article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Information and System Security
- Vol. 8 (2), 228-258
- https://doi.org/10.1145/1065545.1065548
Abstract
To achieve security in wireless sensor networks, it is important to be able to encrypt and authenticate messages sent between sensor nodes. Before doing so, keys for performing encryption and authentication must be agreed upon by the communicating parties. Due to resource constraints, however, achieving key agreement in wireless sensor networks is nontrivial. Many key agreement schemes used in general networks, such as Diffie-Hellman and other public-key based schemes, are not suitable for wireless sensor networks due to the limited computational abilities of the sensor nodes. Predistribution of secret keys for all pairs of nodes is not viable due to the large amount of memory this requires when the network size is large.In this paper, we provide a framework in which to study the security of key predistribution schemes, propose a new key predistribution scheme which substantially improves the resilience of the network compared to previous schemes, and give an in-depth analysis of our scheme in terms of network resilience and associated overhead. Our scheme exhibits a nice threshold property: when the number of compromised nodes is less than the threshold, the probability that communications between any additional nodes are compromised is close to zero. This desirable property lowers the initial payoff of smaller-scale network breaches to an adversary, and makes it necessary for the adversary to attack a large fraction of the network before it can achieve any significant gain.Keywords
This publication has 7 references indexed in Scilit:
- On random graphs. I.Publicationes Mathematicae Debrecen, 2022
- A survey on sensor networksIEEE Communications Magazine, 2002
- Probabilistic Quorum SystemsInformation and Computation, 2001
- An Optimal Class of Symmetric Key Generation SystemsPublished by Springer Science and Business Media LLC ,2000
- The Security of the Cipher Block Chaining Message Authentication CodeJournal of Computer and System Sciences, 2000
- Kerberos: an authentication service for computer networksIEEE Communications Magazine, 1994
- Perfectly-Secure Key Distribution for Dynamic ConferencesLecture Notes in Computer Science, 1993