Skip to main content

Survey on Key Pre Distribution for Security in Wireless Sensor Networks

  • Conference paper
Advances in Computer Science and Information Technology. Networks and Communications (CCSIT 2012)

Abstract

Wireless sensor networks (WSNs) consists of small nodes with constrained capabilities to sense, collect, and disseminate information in many types of applications. As sensor networks become wide-spread, security issues become a central concern. In this paper, we identify the Security requirements of key management in WSN. The secure management of the keys is one of the most critical elements when integrating cryptographic functions into a system. An outline of hybrid cryptography, one way hash and Key infection schemes are discussed in this paper. Along the way we analyze the advantages and disadvantages of current secure schemes. Finally, we aim to provide efficient key management operations for secure communications in WSN.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Akyildiz, I., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2002)

    Article  Google Scholar 

  2. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. Wireless Netw. 8(5), 521–534 (2002)

    Article  MATH  Google Scholar 

  3. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proc. 9th ACM Conf. Comput. Commun. Secur., New York, USA, pp. 41–47 (2002)

    Google Scholar 

  4. Chan, H.W., Perrig, A., Song, D.: Key distribution techniques for sensor networks. Wireless Sensor Networks (2004)

    Google Scholar 

  5. Chan, H.W., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proc. IEEE Symp. Res. Secur. Privacy, pp. 197–213 (2003)

    Google Scholar 

  6. Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A pairwise key pre-distribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secur. 8(2), 228–258 (2005)

    Article  Google Scholar 

  7. Blom, R.: An optimal class of symmetric key generation systems. In: Proc. EURORYPT 1984 Workshop Adv. Cryptol.: Theory Appl. Cryptographic Tech., pp. 335–338 (1985)

    Google Scholar 

  8. Liu, D.G., Ning, P., Li, R.F.: Establishing pairwise keys in distributed sensor net-works. ACM Trans. Inf. Syst. Secur. 8(1), 41–77 (2005)

    Article  Google Scholar 

  9. Çamtepe, S.A., Yener, B.: Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Network. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 293–308. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  10. Chakrabarti, D., Maitra, S., Roy, B.: A Key Predistribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 89–103. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  11. Huang, Q., Cukier, J., Kobayashi, H., Liu, B., Zhang, J.: Fast authenticated key estab-lishment protocols for self-organizing sensor networks. In: Proc. 2nd ACM International Conf. Wireless Sensor Networks Applications, pp. 141–150 (2003)

    Google Scholar 

  12. Zachary, J.: A decentralized approach to secure group membership testing in distributed sensor networks. In: Proc. IEEE Military Commun. Conf. (2003)

    Google Scholar 

  13. Anderson, R., Chan, H., Perrig, A.: Key infection: Smart trust for smart dust. In: Proc. 12th IEEE International Conf. Network Protocols (ICNP) (2004)

    Google Scholar 

  14. Eltoweissy, M., Younis, M., Ghumman, K.: Lightweight key management for wireless sensor networks. In: Proc. IEEE International Conf. Performance, Computing, Commun., pp. 813–818 (2004)

    Google Scholar 

  15. Shi, E., Perrig, A.: Designing secure sensor networks. IEEE Commun. Mag. 11, 38–43 (2004)

    Google Scholar 

  16. Djenouri, D., Khelladi, L., Badache, N.: A survey of security issues in mobile ad hoc and sensor networks. IEEE Commun. Surveys Tutorials 7, 2–28 (2005)

    Article  Google Scholar 

  17. Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sen-sor networks. IEEE Commun. Surveys Tutorials 8, 2–23 (2006)

    Article  Google Scholar 

  18. Carman, D.W., Kruus, P.S., Matt, B.J.: Constraints and approaches for distributed sensor network security, NAI Labs Technical Report (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Rani, T.P., Jaya Kumar, C. (2012). Survey on Key Pre Distribution for Security in Wireless Sensor Networks. In: Meghanathan, N., Chaki, N., Nagamalai, D. (eds) Advances in Computer Science and Information Technology. Networks and Communications. CCSIT 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 84. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27299-8_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-27299-8_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-27298-1

  • Online ISBN: 978-3-642-27299-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics