Key Establishment Algorithms for Some Deterministic Key Predistribution Schemes

Sushmita Ruj, Bimal Roy

2008

Abstract

Key establishment is a major problem in sensor networks because of resource constraints. Several key predistribution schemes have been discussed in literature. Though the key predistribution algorithms have been described very well in these papers, no key establishment algorithm has been presented in some of them. Without efficient key establishment algorithm the key predistribution schemes are incomplete. We present efficient shared-key discovery algorithms for some known deterministic key predistribution schemes. Our algorithms run in O(1) and O( ∛N) time and the communication overhead is at most O(log √N) bits, where N is the size of the network. The efficient key establishment schemes make deterministic key predistribution an attractive option over randomized schemes.

References

  1. Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and rsa on 8-bit cpus. In Joye, M., Quisquater, J.J., eds.: CHES. Volume 3156 of Lecture Notes in Computer Science., Springer (2004) 119-132
  2. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In Atluri, V., ed.: ACM Conference on Computer and Communications Security, ACM (2002) 41-47
  3. Chan, H., Perrig, A., Song, D.X.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, IEEE Computer Society (2003) 197-
  4. Lee, J., Stinson, D.R.: On the construction of practical key predistribution schemes for distributed sensor networks using combinatorial designs. ACM Trans. Inf. Syst. Secur. 11 (2008)
  5. C¸ amtepe, S.A., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks. In Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R., eds.: ESORICS. Volume 3193 of Lecture Notes in Computer Science., Springer (2004) 293-308
  6. Lee, J., Stinson, D.R.: Deterministic key predistribution schemes for distributed sensor networks. In Handschuh, H., Hasan, M.A., eds.: Selected Areas in Cryptography. Volume 3357 of Lecture Notes in Computer Science., Springer (2004) 294-307
  7. Lee, J., Stinson, D.R.: A combinatorial approach to key predistribution for distributed sensor networks. In: IEEE Wireless Communications and Networking Conference, WCNC 2005, New Orleans, LA, USA. (2005)
  8. Ruj, S., Roy, B.K.: Key predistribution using partially balanced designs in wireless sensor networks. In Stojmenovic, I., Thulasiram, R.K., Yang, L.T., Jia, W., Guo, M., de Mello, R.F., eds.: ISPA. Volume 4742 of Lecture Notes in Computer Science., Springer (2007) 431-445
  9. Dong, J., Pei, D., Wang, X.: A key predistribution scheme using 3-designs. In: INSCRYPT. (2007)
  10. Chakrabarti, D., Maitra, S., Roy, B.K.: A key pre-distribution scheme for wireless sensor networks: Merging blocks in combinatorial design. In Zhou, J., Lopez, J., Deng, R.H., Bao, F., eds.: ISC. Volume 3650 of Lecture Notes in Computer Science., Springer (2005) 89-103
  11. Stinson, D.: Combinatorial Designs: Constructions and Analysis. Springer-Verlag, New York (1987)
  12. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A key predistribution scheme for sensor networks using deployment knowledge. IEEE Trans. Dependable Sec. Comput. 3 (2006) 62-77
Download


Paper Citation


in Harvard Style

Ruj S. and Roy B. (2008). Key Establishment Algorithms for Some Deterministic Key Predistribution Schemes . In Proceedings of the 6th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2008) ISBN 978-989-8111-44-9, pages 68-77. DOI: 10.5220/0001729900680077


in Bibtex Style

@conference{wosis08,
author={Sushmita Ruj and Bimal Roy},
title={Key Establishment Algorithms for Some Deterministic Key Predistribution Schemes},
booktitle={Proceedings of the 6th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2008)},
year={2008},
pages={68-77},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001729900680077},
isbn={978-989-8111-44-9},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 6th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2008)
TI - Key Establishment Algorithms for Some Deterministic Key Predistribution Schemes
SN - 978-989-8111-44-9
AU - Ruj S.
AU - Roy B.
PY - 2008
SP - 68
EP - 77
DO - 10.5220/0001729900680077