MPKMS: A Matrix-based Pairwise Key Management Scheme for Wireless Sensor Networks

Fatemeh Banaie, Seyed Amin Hosseini Seno, Reem Hajaj Aljoufi, Rahmat Budiarto

Abstract


Due to the sensitivity of the Wireless Sensor Networks (WSN) applications and resource constraints, authentication and key management emerge as a challenging issue for WSN. In general, various approaches have been developed for the key management in WSN. This paper has come up with a new robust key pre-distribution scheme using random polynomial functions and matrix. This new proposed scheme significantly increases the storage efficiency and provides resilience to network against node capture by using random prime numbers, polynomial functions and matrix properties. The effectiveness of the scheme is demonstrated through a security analysis and comparison with the existing schemes.

Keywords


Resource constraint; authentication; key management; pre-distribution; polynomial functions

References


S. Zhu, S. Setia, and S. Jajodia, “LEAP: efficient security mechanisms for large-scale distributed sensor networks,” ACM Transactions on Sensor Networks, vol. 2, no. 4, pp. 500–528, 2006.

X. Fan and G.Gong, “LPKM: A Lightweight Polynomial-Based Key Management Protocol for Distributed Wireless Sensor Networks”, LNICST 111, pp. 180-195, 2013.

W. Du, J. Deng, Y.S. Han, P.K. Varshney, J. Katz and A. Khalili, “A paiwise Key Predistribution Scheme for Wireless Sensor Networks”, ACM Transaction on Information and System Security, Vol. 8, No. 2, May 2005, pp. 228-258.

S.J. Chio, K. T. Kim, H. Y. Youn, “An Energy-Efficient Key Predistribution Scheme for Secure Wireless Sensor Networks Using Eigenvector”, International Journal of Distributed Sensor Networks, 2013.

W. Bechkit, Y. Challal, A. Bouabdallah, V. Tarokh, “ A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks”, IEEE Transaction on Wireless Communication, Vol. 12, No. 2, 2013.

L. Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks,” in Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41– 47, November 2002.

H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” in Proceedings of the IEEE Symposium on Security and Privacy, pp. 197–213, May 2003.

S. A.Camtepe and B. Yener, “Combinatorial design of key distribution mechanisms for wireless sensor network,” in Proceedings of the 9th European Symposium on Research in Computer Security (ESORICS ’04), pp. 293–308, 2004.

J. Lee and D. R. Stinson, “On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs,” ACM Transactions on Information and System Security, vol. 11, no. 2, pp. 1–35, 2008.

D. Liu and P. Ning, “Establishing pairwise keys in distributed sensor networks,” in Proc. 2003 ACM CCS, pp. 52–61.

R. Blom, “An optimal class of symmetric key generation systems,” in Proc. 1985 Eurocrypt Workshop Advances Cryptology: Theory Appl. Cryptographic Techniques, pp. 335–338.

Z. Yu and Y. Guan, “A robust group-based key management scheme for wireless sensor networks,” in Proc. 2005 IEEE WCNC, pp. 1915–1920.

J. Huang, G. H. Ou, “A Public Key Polynomial-based Key Pre-distribution Scheme for Large-Scale Wireless Sensor Networks.” Ad Hoc & Sensor Wireless Networks 16(1-3), 45–64 ,2012.

X.Du, Y.Xiao, M. Guizani, H.H Chen, “ An effective key management scheme for heterogeneous sensor network”, Ad Hoc Networks, vol. 5, pp. 24-34, 2007.


Full Text: PDF

Refbacks

  • There are currently no refbacks.