0% found this document useful (0 votes)
142 views7 pages

Wireless Sensor Network Security

This document discusses key management schemes for wireless sensor networks. It describes how key management schemes can be classified based on the cryptosystem used, key distribution methods, and network topology. Symmetric key management uses the same key for encryption and decryption while asymmetric uses different keys. Random key management randomly assigns keys while deterministic calculates keys. Distributed schemes use collaboration between nodes for key negotiation while hierarchical uses cluster heads. Several typical key management schemes are also summarized such as E-G, composite, and group-based schemes.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
142 views7 pages

Wireless Sensor Network Security

This document discusses key management schemes for wireless sensor networks. It describes how key management schemes can be classified based on the cryptosystem used, key distribution methods, and network topology. Symmetric key management uses the same key for encryption and decryption while asymmetric uses different keys. Random key management randomly assigns keys while deterministic calculates keys. Distributed schemes use collaboration between nodes for key negotiation while hierarchical uses cluster heads. Several typical key management schemes are also summarized such as E-G, composite, and group-based schemes.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

ROHINI COLLEGE OF ENGINEERING AND TECHNOLOGY

5.3 Key Management

Due to the characteristics of the wireless sensor networks, many popular and
mature key management schemes in traditional wireless networks cannot be
directly applied to wireless sensor networks. In the security solutions for
wireless sensor networks, encryption technology is the basis for a number of
security technologies, by encrypting wireless sensor networks that can meet the
needs of certification, confidentiality, nonrepudiation, integrity, and so on. For
encryption technology, key management is the key issue to be resolved.

5.3.1 Key Management Schemes Classification

In recent years, various key management schemes have been proposed.


There can be a variety of categories for these schemes according to the
characteristics of them. According to the cryptosystem they used, they can be
divided into symmetric and asymmetric key management schemes.
According to key distribution methods of the node, they can be split into
random key management schemes and deterministic key management
schemes. According to the network topology, they can be divided into
distributed key management schemes and hierarchical key management
scheme and various others scheme.
(1) Symmetric and Asymmetric Key Management - Depending on the
difference of cryptosystem, the wireless sensor network key
management can be divided into symmetric key management and
asymmetric key management. In symmetric key management, the
encryption and decryption key of the sensor node are the same, which is
simple, and it has a small calculation and storage amount. Comparing
with the asymmetric key, the symmetric key has an advantage in terms
of computational complexity, but it is inadequate in the aspects of key
management
CS8088-ADHOC AND WIRELESS SENSOR NETWORKS
ROHINI COLLEGE OF ENGINEERING AND TECHNOLOGY

and security. Asymmetric key management has been considered


unsuitable for wireless sensor networks, mainly due to its relatively high
requirement for computing, storage, and communication capabilities of
nodes. But with the gradual deepening of the relevant studies, some
asymmetric encryption algorithms can now be applied in wireless sensor
networks.
(2) Random and Deterministic Key Management - According to the
difference of the method in which nodes obtain the key, the key
management in wireless sensor network can be split into random key
management and deterministic key management. In the random key
management, sensor nodes get their keys from the key pool or
multiple keys space by random sampling. In deterministic key
management, sensor nodes calculate the determination probability to
get their keys. The advantages of random key management are a
relatively simple way to get the key and the flexible deployment, and
its disadvantage is that there may exist part of useless key information
in the sensor nodes. The advantages of deterministic key
management are that it can obtain more accurate key and the session
key can be established directly between any two sensor nodes. Its
disadvantage is that flexibility of deployment decreases and
computational overhead of key negotiation becomes large.
(3) Distributed and Hierarchical Key Management - Depending on the
topology of network, the wireless sensor network key management can
be divided into distributed key management and hierarchical key
management. In distributed key management, the computation and
communication capabilities of sensor nodes are the same, and the key
negotiation and update are completed through the mutual cooperation
between sensor nodes. In hierarchical key management, network nodes

CS8088-ADHOC AND WIRELESS SENSOR NETWORKS


ROHINI COLLEGE OF ENGINEERING AND TECHNOLOGY
are split into clusters, and each cluster is composed of cluster head and
ordinary sensor nodes. The ordinary sensor nodes complete key
distribution, consultation, and update through their cluster head. The
characteristic of distributed key management is that the neighbouring
nodes collaborate to achieve key negotiation. The feature of hierarchical
key management is that the requirement of computation and storage
capacities of the common nodes is not too high, but once the cluster head
is captured by the attacker, it will threaten the security of the entire
network.

5.3.2 Typical Schemes of Key Management

1. Eschenauer and Gligor (E-G Scheme) first proposed a key management


scheme for distributed sensor networks. The basic idea of the program
is that a large key pool with the key and key identifier are generated first,
each node could select different keys from the key pools randomly; such
randomly pre-assigned manner made any two nodes have a certain
probability of existing shared key. If there are shared keys between two
adjacent nodes, then select one randomly as the paired key of the two
sides to establish a secure channel. Otherwise, the entered node
establishes a key path of the two sides through other neighbouring nodes
that exists shared key after several jumps. The advantages of E-G
scheme are mainly reducing the key storage pressure of each node and
suitable for large- scale WSN key management. But there are also
disadvantages of this program, and its security communication is
uncertainly because the establishment of shared key is based on
probability.
2. On the basis of E-G scheme, Chan et al. proposed a composite random
key pre- distribution scheme. The specific implementation process of -
composite random key pre-distribution scheme is basically similar to
CS8088-ADHOC AND WIRELESS SENSOR NETWORKS
ROHINI COLLEGE OF ENGINEERING AND TECHNOLOGY
E-G scheme, except that the E- G program just selects a public key as
the main shared key between two nodes, while the -composite scheme
requires that two adjacent nodes can establish the main shared key
after the deployment only when there is at least shared key between
them. Compared with the E-G scheme, the - composite program
improves the capacity of resisting capture attacks of nodes but
increases the overlap degree of shared key between the nodes and
limits the scalability of the network.
3. Zhu et al. thought that any single key mechanism could not achieve
the security needs of wireless sensor networks, so they proposed a
LEAP protocol based on multiple key mechanisms to establish secure
communications. The protocol maintained four keys in each node - a
globally key shared with the base station, a group key shared with all
nodes within the network, a paired key shared with neighbouring
nodes, and a cluster head key shared with the cluster head. Compared
with the random key pre-distribution protocol, the nodes’
computation loads and storage space requirements for the LEAP
protocol will increase, but it can guarantee that there is a shared key
between the nodes needed to exchange data and support a variety of
network communication modes.

4. Donggang et al. proposed a key distribution scheme based node group.


The basic idea of the program is to assume the system to generate a large
key pool beforehand, then it is divided into several subkey pools, making
sure that each node deployment group has a corresponding subkey pool.
Then the nodes of each deployment group select some keys from the
corresponding subkey pool randomly. Due to the fact that the
establishment of the secure channel between nodes needs at least one
shared key, so it requires there should be public key between the

CS8088-ADHOC AND WIRELESS SENSOR NETWORKS


ROHINI COLLEGE OF ENGINEERING AND TECHNOLOGY
corresponding subkey pools of neighborhood groups to ensure the
connectivity between nodes. Donggang et al. set up the repetition factor
of the same key between the corresponding subkey pools of adjacent
groups. The scheme is more safer, after the node is under attack, it has
little impact on the security of other nodes in the network, but the storage
overhead of such key management scheme is large; for the resource-
constrained wireless sensor networks it is a very serious problem.
5. Du and Guizani et al. suggested that many key management schemes
which based on symmetric key considered too much about network
connectivity and hope to find a method that any two nodes can get shared
key while ignore the communication of the two nodes. In the context of
heterogeneous sensor networks, they proposed a route-drive public key
management scheme based lightweight ECC, which only allocated
communication key for neighbor node. The performance simulation
shows that, compared to the symmetric key mechanism, this scheme
significantly improved safety and also saved energy and storage space
compared to key management schemes of other asymmetric key
mechanisms.

5.3.3 Certification

Network security certification is another important part of the network. It


includes identity authentication and message authentication, and methods used
are symmetric encryption and asymmetric encryption method. This section
summarizes research work on the two modes of certification.

5.3.3.1 Identity Authentication

Wireless sensor nodes are deployed to work after the domain, on the one
hand, to ensure that users have the legal status to join the network, and, on

CS8088-ADHOC AND WIRELESS SENSOR NETWORKS


ROHINI COLLEGE OF ENGINEERING AND TECHNOLOGY
the other hand to effectively prevent unauthorized users from joining, so the
wireless sensor network authentication mechanism must be used to
determine the user’s identity legitimacy. By using legitimate authentication
of neighbouring nodes or nodes and base stations, wireless sensor network
provides secure access mechanism, when all nodes access the self-
organizing network. There are currently certified questions symmetric
encryption algorithm based authentication methods and authentication
methods based on asymmetric encryption algorithms.
(1) Authentication Based Symmetric Encryption Algorithm - In
wireless sensor networks, due to the limited energy of nodes, the nodes
of computing power and communication bandwidth, computational
overhead of symmetric cryptosystem is much smaller than the
asymmetric cryptosystem. Considered from the perspective of resource
conservation, the symmetric cryptosystem is the most suitable
characteristics for wireless sensor networks.
(2) Authentication Based Asymmetric Encryption Algorithm - Although
symmetric cryptosystem has an advantage in the calculation of
authentication, it has no strong asymmetric cryptography in terms of
safety, and after the elliptic curve cryptosystem proposed, many studies
show that even if there is a defect that the amount of computation and
storage load are too large, asymmetric keys are still available for
wireless sensor networks, asymmetric keys can still be used for wireless
sensor networks. Here are some typical asymmetric cryptography
schemes.

5.3.3.2 Message Authentication

Message authentication means to confirm the message received from sender


statement. Message authentication can be achieved by symmetric encryption
CS8088-ADHOC AND WIRELESS SENSOR NETWORKS
ROHINI COLLEGE OF ENGINEERING AND TECHNOLOGY
and digital signature technology. At present, there are mainly two types of
message authentication; one is point-to-point message authentication and the
other is broadcast authentication. In a point-to-point message authentication,
most of ID authentication methods can be to achieve. In wireless sensor
networks, in order to save resources, broadcast is a common method of
transmission. Currently, TESLA protocol is the most classic broadcast
authentication protocol, and a lot of research work is commenced on the
TESLA protocol.

CS8088-ADHOC AND WIRELESS SENSOR NETWORKS

You might also like