Open Access Open Access  Restricted Access Subscription or Fee Access

A Triplet Key Approach for Confidentiality in Dynamic Wireless Sensor Networks

J. Lekha

Abstract


These are several methods of exchanging secret keys among the systems on the wireless sensor network. Because of its high chance of vulnerability most of the existing methods have security against only any one of the security mechanisms but not all. So we propose a multi secure approach which combines more than one protection mechanism. The aim of this approach is to distribute secret keys among the nodes on dynamic wireless sensor networks called Network Coding Approach. Existing methods for distributing keys in static wireless sensor networks which does not have extensibility. They are 1) Public key distribution 2) KDC 3) Key Predistribution. The drawback of existing static method is that it creates network traffic when the existing predistributed keys have been exhausted. The server node is subjected to single point of attack which results in failure of network. We extend one of the existing methods along with the proposed system. The proposed coding approach of achieving security mechanisms contain 1) client to server pairwise key distribution 2) mutual key distribution 3) node blocking. The server S node bootstraps the network and act as key enabler. We concentrate on authentication of server node for some single point of attack. Thus the approach is said to prove in confidentiality, authentication and also reliability. Our results include performance evaluation with other existing mechanisms such as Hybrid approach; Tree based approach and using some security metrics and resource utilization it is proven to be best.

Keywords


KDC, Public Keys, Wireless Sensor Networks.

Full Text:

PDF

References


P. F. Oliveira, R. A. Costa, and J. Barros, “Mobile secret key distribution with network coding,” presented at the Int. Conf. Security Cryptography,Jul. 2007.

P. F. Oliveira and J. Barros, “Network coding protocols for secret key distribution,” in Proc. Int. Symp. Information Security, Nov. 2007, pp.1718–1733.

W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili,“A pairwise key predistribution scheme for wireless sensor networks,”ACM Trans. Inf. Syst. Secur., vol. 8, no. 2, pp. 228–258, 2005.

D. Malan, M. Welsh, and M. Smith, “A public-key infrastructure for key distribution in tinyos based on elliptic curve cryptography,” presented at the 1st IEEE Int. Conf. Sensor and Ad Hoc Communications and

Networks, Santa Clara, CA, Oct. 2004. [Online]. Available: citeseer. ist.psu.edu/malan04publickey.html.

A. Perrig, R. Szewczyk, J. D. Tygar, V.Wen, and D. E. Culler, “SPINS: Security protocols for sensor networks,” Wireless Netw., vol. 8, no. 5, pp. 521–534, 2002.

L. Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks,” in Proc. 9th ACMConf. Computer and Communications Security, New York, 2002, pp. 41–47.

S. Zhu, S. Setia, and S. Jajodia, “LEAP: Efficient security mechanisms for large-scale distributed sensor networks,” in Proc. 10th ACM Conf. Computer and Communications Security, New York, 2003, pp. 62–72.

C. Fragouli, J.-Y. L. Boudec, and J. Widmer, “Network coding: An instant primer,” Proc. SIGCOMM Comput. Commun. Rev., vol. 36, no. 1, pp. 63–68, 2006.

S. Deb, M. Effros, T. Ho, D. Karger, R. Koetter, D. Lun, M. Medard, and N. Ratnakar, “Network coding for wireless applications: A brief tutorial,” presented at the IWWAN, London, U.K., May 2005.

K. Bhattad and K. Narayanan, “Weakly secure network coding,” presented at the 1st Workshop on Network Coding, Theory, and Applications, Riva del Garda, Italy, 2005.

F. Stajano and R. J. Anderson, B. Christianson, B. Crispo, J. A. Malcolm, and M. Roe, Eds., “The resurrecting duckling: Security issues for ad-hoc wireless networks,” in Security Protocols Workshop, 1999, vol. 1796, pp. 172–194, Lecture Notes Comput. Sci., Springer.

F. Stajano, Security for Ubiquitous Computing. New York: Wiley,Feb. 2002. [Online]. Available: http://www.cl.cam.ac.uk/fms27/secubicomp/.

G. S. Vernam, “Cipher printing telegraph systems for secret wire and radio telegraphic communications,” J. Amer. Inst. Elect. Eng., vol. XLV, pp. 109–115, 1926.

A. Francillon and C. Castelluccia, “TinyRNG: A cryptographic random number generator for wireless sensors network nodes,” presented at the 5th Int. Symp. Modeling and Optimization Mobile, Ad Hoc, and Wireless Networks(WiOpt), 2007.

C. Karlof and D.Wagner, “Secure routing in wireless sensor networks: Attacks and countermeasures,” Ad Hoc Netw., vol. 1, no. 2–3, pp. 293–315, 2003.

T. Ho, B. Leong, R. Koetter, M. Medard, M. Effros, and D. Karger, “Byzantine modification detection in multicast networks using randomized network coding,” presented at the IEEE Int. Symp. Information Theory, Chicago, IL, Jul. 2004.

D. Lim, J. W. Lee, B. Gassend, G. E. Suh, M. van Dijk, and S. Devadas, “Extracting secret keys from integrated circuits,” IEEE Trans. Very Large Scale Integr. Syst., vol. 13, no. 10, pp. 1200–1205, Oct.2005.

C. Shannon, “Communication theory of secrecy systems,” Bell Syst. Tech. J., vol. 28, no. 4, pp. 656–715, 1949.

B. Schneier, Appl. Cryptography. New York: Wiley, 1994. Oliveira and barros: network coding approach to secret key distribution 423

A. Becher, Z. Benenson, and M. Dornseif, J. A. Clark, R. F. Paige, F. Polack, and P. J. Brooke, Eds., “Tampering with motes: Real-world physical attacks on wireless sensor networks,” in Proc. 3rd Int. Conf. Security Pervasive Computing., York, U.K., Apr. 18–21, 2006, vol. 3934, pp. 104–118, Springer, 2006, ser. Lecture Notes Comput. Sci.

L. Lima, M. Médard, and J. Barros, “Random linear network coding: A free cipher?,” presented at the IEEE Int. Symp. Information Theory, Jun. 2007

W. Stallings, Cryptography and network security : principles and practice, Prentice Hall, 1999.] P. van Oorschot A. Menezes and S. Vanstone, Handbook of Applied Cryptography,,CRC Press, 1997.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.