Open Access Open Access  Restricted Access Subscription or Fee Access

Random Pair Key Distribution Based Security in Ubiquitous Computing

P.N. Karthikayan, C. Seelammal

Abstract


Secure communications in wireless adhoc networks operating under adversarial conditions require providing pairwise keys to adhoc nodes. In large scale deployment scenarios, there is no prior knowledge of post deployment network configuration since nodes may be randomly scattered over a hostile territory. Thus, shared keys must be distributed before deployment to provide each node. For large adhoc networks it is infeasible to store a unique key for all other nodes in the key-chain of an adhoc node. Providing a suitable key establishment scheme in wireless adhoc networks is challenging due to all the characteristics of these networks, such as limitations of power, computation capability and storage resources. Pairwise key establishment is a fundamental security service in adhoc networks; it enables nodes to communicate securely with each other using cryptographic techniques. However, due to the resource constraints, it is infeasible to use traditional key management techniques such as public key cryptography and key distribution center (KDC). To facilitate the study of novel pairwise key predistribution techniques, this paper presents a general framework for establishing pairwise keys between nods on the basis of Scalable Method of Cryptographic Keys. This paper then presents two efficient instantiations of the general framework: a random key generation and a random subset assignment key distribution scheme. The analysis in this paper indicates that these two schemes have a number of well defined properties, including high probability (or guarantee) to establish pairwise keys, tolerance of node captures, and low communication overhead. Finally, this paper presents a technique to reduce the computation at nodes required by these schemes

Keywords


Network Security, Ubiquitous computing, Key Management, Message Digest Hash

Full Text:

PDF

References


L. Zhou and Z. J. Haas, “Securing ad hoc networks,” IEEE Netw. Mag., vol. 13, no. 6, pp. 24–30, Nov. 1999 .

A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, “SPINS: security protocols for sensor networks,” WirelessNetworks, vol. 8, no. 5, pp. 521–534, 2002.

L. Eschenauer and V. D. Gligor, “A key-management scheme for distributed sensor networks,” in Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS ’02), pp. 41–47, November 2002.

Distributed KDC-Based Random Pairwise Key Establishment in Wireless Sensor Networks Zhong Su,1 Yixin Jiang,1 Fengyuan Ren,1 Chuang Lin,1 and Xiaowen Chu2

Scalable Method of cryptographic key management for mission critical wireless Ad-Hoc networks by Wenbo He, Ying Huang, Ravishankar Sathyam, Klara Nahrstedt, and Whay C. Lee . IEEE transaction vol1 2009.

D. Boneh and M. Franklin, “Identity based encryption from the Weil pairing,” SIAM J. Comput., vol. 32, no. 3, pp. 586–615, 2003.

D. Liu and P. Ning, “Establishing pairwise keys in distributed sensor networks,” in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS ’03), pp. 52–61, October 2003.

W. Du, Y. S. Han, J. Deng, and P. K. Varshney, “A pair-wise key pre-distribution scheme for wireless sensor networks,” in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS ’03), pp. 42–51, October 2003.

D. Liu and P. Ning, “Location-based pair-wise key establishments for static sensor networks,” in Proceedings of the 1st ACMWorkshop on Security of Ad Hoc and Sensor networks, pp. 72–82, October 2003.

D. Huang, M. Mehta, D. Medhi, and L. Harn, “Locationaware key management scheme for wireless sensor networks,” in Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN ’04), pp. 29–42, October 2004.

W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, “A key management scheme for wireless sensor networks using deployment knowledge,” in Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications2004

http://orlingrabbe.com/des.htm


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.