Abstract
Wireless sensor networks (WSNs) consists of small nodes with constrained capabilities to sense, collect, and disseminate information in many types of applications. As sensor networks become wide-spread, security issues become a central concern. In this paper, we identify the Security requirements of key management in WSN. The secure management of the keys is one of the most critical elements when integrating cryptographic functions into a system. An outline of hybrid cryptography, one way hash and Key infection schemes are discussed in this paper. Along the way we analyze the advantages and disadvantages of current secure schemes. Finally, we aim to provide efficient key management operations for secure communications in WSN.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Akyildiz, I., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2002)
Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. Wireless Netw. 8(5), 521–534 (2002)
Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proc. 9th ACM Conf. Comput. Commun. Secur., New York, USA, pp. 41–47 (2002)
Chan, H.W., Perrig, A., Song, D.: Key distribution techniques for sensor networks. Wireless Sensor Networks (2004)
Chan, H.W., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: Proc. IEEE Symp. Res. Secur. Privacy, pp. 197–213 (2003)
Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A pairwise key pre-distribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secur. 8(2), 228–258 (2005)
Blom, R.: An optimal class of symmetric key generation systems. In: Proc. EURORYPT 1984 Workshop Adv. Cryptol.: Theory Appl. Cryptographic Tech., pp. 335–338 (1985)
Liu, D.G., Ning, P., Li, R.F.: Establishing pairwise keys in distributed sensor net-works. ACM Trans. Inf. Syst. Secur. 8(1), 41–77 (2005)
Çamtepe, S.A., Yener, B.: Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Network. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 293–308. Springer, Heidelberg (2004)
Chakrabarti, D., Maitra, S., Roy, B.: A Key Predistribution Scheme for Wireless Sensor Networks: Merging Blocks in Combinatorial Design. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 89–103. Springer, Heidelberg (2005)
Huang, Q., Cukier, J., Kobayashi, H., Liu, B., Zhang, J.: Fast authenticated key estab-lishment protocols for self-organizing sensor networks. In: Proc. 2nd ACM International Conf. Wireless Sensor Networks Applications, pp. 141–150 (2003)
Zachary, J.: A decentralized approach to secure group membership testing in distributed sensor networks. In: Proc. IEEE Military Commun. Conf. (2003)
Anderson, R., Chan, H., Perrig, A.: Key infection: Smart trust for smart dust. In: Proc. 12th IEEE International Conf. Network Protocols (ICNP) (2004)
Eltoweissy, M., Younis, M., Ghumman, K.: Lightweight key management for wireless sensor networks. In: Proc. IEEE International Conf. Performance, Computing, Commun., pp. 813–818 (2004)
Shi, E., Perrig, A.: Designing secure sensor networks. IEEE Commun. Mag. 11, 38–43 (2004)
Djenouri, D., Khelladi, L., Badache, N.: A survey of security issues in mobile ad hoc and sensor networks. IEEE Commun. Surveys Tutorials 7, 2–28 (2005)
Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sen-sor networks. IEEE Commun. Surveys Tutorials 8, 2–23 (2006)
Carman, D.W., Kruus, P.S., Matt, B.J.: Constraints and approaches for distributed sensor network security, NAI Labs Technical Report (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Rani, T.P., Jaya Kumar, C. (2012). Survey on Key Pre Distribution for Security in Wireless Sensor Networks. In: Meghanathan, N., Chaki, N., Nagamalai, D. (eds) Advances in Computer Science and Information Technology. Networks and Communications. CCSIT 2012. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 84. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27299-8_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-27299-8_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27298-1
Online ISBN: 978-3-642-27299-8
eBook Packages: Computer ScienceComputer Science (R0)