Advanced Search
Volume 32 Issue 4
Dec.  2010
Turn off MathJax
Article Contents
Liu Wei, Luo Rong, Yang Hua-zhong. A Lightweight Key Establishment Protocol for Wireless Sensor Networks[J]. Journal of Electronics & Information Technology, 2010, 32(4): 869-874. doi: 10.3724/SP.J.1146.2009.00349
Citation: Liu Wei, Luo Rong, Yang Hua-zhong. A Lightweight Key Establishment Protocol for Wireless Sensor Networks[J]. Journal of Electronics & Information Technology, 2010, 32(4): 869-874. doi: 10.3724/SP.J.1146.2009.00349

A Lightweight Key Establishment Protocol for Wireless Sensor Networks

doi: 10.3724/SP.J.1146.2009.00349
  • Received Date: 2009-03-19
  • Rev Recd Date: 2009-08-13
  • Publish Date: 2010-04-19
  • In this paper, a lightweight key establishment protocol for wireless sensor networks is proposed. By optimizing information exchanges in the process of key establishment, this temporal initial key based protocol is able to achieve better extensibility and lower energy consumption. Theoretical analysis of finish time and totally connected probability verifies that this protocol is feasible. The simulation results show that, the connected probability is larger than 97% for typical network density. Compared with similar protocols, this protocol needs much less time to finish with enough connected probability. The finish time is less than 5.2s at the network density of 30 nodes per hop. Moreover, energy consumption is only 25% of those of similar protocols, which makes this protocol more suitable for resource constrained sensor nodes.
  • loading
  • Perrig A, Stankovic J, and Wagner D. Security in wirelesssensor networks[J]. Communications of the ACM, 2004, 47(6):53-57.[2]Karlof C, Sastry N, and Wagner D, et al.. Tinysec: a link layersecurity architecture for wireless sensor networks[C]. The 2ndACM Conf. Embedded Networked Sensor Systems, Baltimore,Maryland, USA, Nov. 3-5, 2004: 162-175.[3]Basagni S.[J].Herrin K, and Rosti E, et al.. Secure pebblenets[C].The 2nd ACM Intl Symp. Mobile Ad hoc Networking andComputing, Long Beach, CA, USA, Oct. 04-0.2001,:-Perrig A.[J].Szewczyk R, and Wen V, et al.. SPINS: Securityprotocols for sensor networks[C]. The 7th Intl Conf. MobileComputing and Networking, Rome, Italy, Jul. 16-2.2001,:-[4]Eschenauer L and Gligor V. A key-management scheme fordistributed sensor networks[C]. The 9th ACM Conf.Computer and Communications Security, Washington, DC,USA, Nov. 17-21, 2002: 41-47.[5]Chan H, Perrig A, and Song D. Random key predistributionschemes for sensor networks[C]. The IEEE Symp. Securityand Privacy, Oakland, California, USA, May. 11-14, 2003:197-213.Zhu S.[J].Xu S, and Setia S, et al.. Establishing pair-wise keysfor secure communication in Ad Hoc networks: a probabilisticapproach[C]. The 11th IEEE Intl Conf. Network Protocols,Atlanta, Georgia, USA, Nov. 4-.2003,:-[6]Du W, Deng J, and Han Y, et al.. A pairwise keypredistribution scheme for wireless sensor networks[J].ACMTransactions on Information and System Security.2005, 8(2):228-258[7]Liu D, Ning P, and Li R. Establishing pairwise keys indistributed sensor networks[J].ACM Transactions onInformation and System Security.2005, 8(1):41-77[8]Huang D, Mehta M, and Liefvoort A V D, et al.. Modelingpairwise key establishment for random key predistribution inlarge-scale sensor networks[J].IEEE/ACM Transactions onNetworking.2007, 15(5):1204-1215[9]Law Y W.[J].Yen L H, and Pietro R D, et al.. Securek-connectivity properties of wireless sensor networks[C]. The4th IEEE Intl Conf. Mobile Ad-hoc and Sensor Systems,Pisa, Italy, Oct. 8-1.2007,:-[10]Wu J and Stinson D R. Minimum node degree andk-connectivity for key predistribution schemes anddistributed sensor networks[C]. The 1st ACM Conf. WirelessNetwork Security, Alexandria, Virginia, USA, Mar. 31-Apr. 2,2008: 119-124.[11]Camtepe S A and Yener B. Combinatorial design of keydistribution mechanisms for wireless sensor networks[J].IEEE/ACM Transactions on Networking.2007, 15(2):346-358[12]Delgosha F.[J].Ayday E, and Fekri F. MKPS: a multivariatepolynomial scheme for symmetric key-establishment indistributed sensor networks[C]. The ACM Intl WirelessCommunications and Mobile Computing Conference,Honolulu, Hawaii, USA, Aug. 12-1.2007,:-[13]Liu D and Ning P. Location-based pairwise key establishmentfor static sensor networks[C]. The 1st ACM Workshop onSecurity of Ad hoc and Sensor Networks, Fairfax, VA, USA,Oct. 31-31, 2003: 72-82.[14]Du W, Deng J, and Han Y, et al.. A key management schemefor wireless sensor networks using deployment knowledge[C].The 23rd IEEE Conf. Computer Communications, HongKong, Mar. 7-11, 2004: 586-597.[15]Liu D, Ning P, and Du W. Group-based key predistributionfor wireless sensor networks [J]. ACM Transactions on SensorNetworks, 2008, 4(2): 1-30.[16]Canh N T, Truc P T H, and Hai T H, et al.. Enhancedgroup-based key management scheme for wireless sensornetworks using deployment knowledge[C]. The 6th AnnualIEEE Consumer Communications and NetworkingConference, Las Vegas, Nevada, USA, Jan. 10-13, 2009: 1-5.[17]Zhu S, Setia S, and Jajodia S. LEAP+: efficient securitymechanisms for large-scale distributed sensor networks [J].ACM Transactions on Sensor Networks.2006, 2(4):500-528[18]Anderson R.[J].Chan H, and Perrig A. Key infection: smarttrust for smart dust[C]. The 12th IEEE Intl Conf. NetworkProtocols, Berlin, Germany, Oct. 5-.2004,:-[19]Deng J.[J].Hartung C, and Han R, et al.. A practical study oftransitory master key establishment for wireless sensornetworks[C]. The 1st IEEE/CreateNet Intl Conf. Securityand Privacy for Emerging Areas in Communication Networks,Athens, Greece, Sep. 5-.2005,:-[20]Woo A and Culler D E. A transmission control scheme formedia access in sensor networks[C]. The 7th Intl Conf.Mobile Computing and Networking, Rome, Italy, Jul. 16-21,2001: 221-235.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3586) PDF downloads(852) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return