Using bivariate polynomial to design a dynamic key management scheme for wireless sensor networks

Wireless sensor networks (WSN) have become increasingly popular in monitoring environments such as: disaster relief operations, seismic data collection, monitoring wildlife and military intelligence. The sensor typically consists of small, inexpensive, battery-powered sensing devices fitted with wireless transmitters, which can be spatially scattered to form an ad hoc hierarchically structured network. Recently, the global positioning system (GPS) facilities were embedded into the sensor node architecture to identify its location within the operating environment. This mechanism may be exploited to extend the WSN’s applications. To face with the security requirements and challenges in hierarchical WSNs, we propose a dynamic location-aware key management scheme based on the bivariate polynomial key predistribution, where the aggregation cluster nodes can easily find their best routing path to the base station, by containing the energy consumption, storage and computation demands in both the cluster nodes and the sensor nodes. This scheme is robust from the security point of view and able to work efficiently, despite the highly constrained nature of sensor nodes.

[1]  Alan Bundy,et al.  Constructing Induction Rules for Deductive Synthesis Proofs , 2006, CLASE.

[2]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[3]  Keith M. Martin,et al.  An Application-Oriented Framework for Wireless Sensor Network Key Establishment , 2008, Electron. Notes Theor. Comput. Sci..

[4]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[5]  Jang-Ping Sheu,et al.  Pair-wise path key establishment in wireless sensor networks , 2007, Comput. Commun..

[6]  Francesco Palmieri,et al.  Evaluating Network-Based DoS Attacks under the Energy Consumption Perspective: New Security Issues in the Coming Green ICT Area , 2011, 2011 International Conference on Broadband and Wireless Computing, Communication and Applications.

[7]  Feng Xia,et al.  Energy-efficient opportunistic localization with indoor wireless sensor networks , 2011, Comput. Sci. Inf. Syst..

[8]  Xue Wang,et al.  Distributed Energy Optimization for Target Tracking in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[9]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[10]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[11]  Xuanjing Shen,et al.  An improved node localization algorithm based on DV-Hop for wireless sensor networks , 2011, Comput. Sci. Inf. Syst..

[12]  Dharma P. Agrawal,et al.  An improved key distribution mechanism for large-scale hierarchical wireless sensor networks , 2007, Ad Hoc Networks.

[13]  Chin-Ling Chen,et al.  A Novel Key Management of Two-Tier Dissemination for Wireless Sensor Network , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.