We already have seen that P(A) = P(K
i
= x) =
1/2
n
. We have that:
P(B|A) = P(K
1
⊕ K
i
= z
1
,...,K
m
⊕ K
i
= z
m
|K
i
= x)
=
m
∏
j=1
P(K
j
= z
j
⊕ x) =
1
2
n(m−1)
P(B) = P(K
1
⊕ K
i
= z
1
,...,K
m
⊕ K
i
= Z
m
)
=
m
∏
j=1
P(K
j
⊕ K
i
= z
j
) =
1
2
n(m−1)
Therefore, we have that P(A|B) =
1
2
n(m−1)
·
1
2
n
1
2
n(m−1)
.
3.3 Memory Requirements
We recall that each node n has C keys K
i
in memory,
each one identified by |i| = |n| + | j| bits, where | · | de-
notes the size of the argument. To store the protocol
data, each node requires |n| + C ∗ (| j| + |K
i
|) bits of
memory space and the mobile node needs 2
|i|
∗ (|i| +
|K
i
|) = |
P | ∗ (⌈log
2
(|P |)⌉ + |K
i
|) bits. For example, if
we assign n = 24 there is space for 16.777.216 differ-
ent node identifiers. For j = 8, each sensor node can
obtain 256 keys (e.g. if each node initially has C = 20
keys in its memory, there is space for 246 extra keys).
Table 1 illustrates the required resources, which we
deem very reasonable under current technology.
Table 1: Required memory for each sensor node (SN) and
required memory for the mobile node (MN), for fixed values
of n = 24, j = 8 and C = 20.
|K
i
| Size on SN Size on MN
128 bit 343 Bytes 80.0 GB
64 bit 183 Bytes 48.0 GB
32 bit 103 Bytes 32.0 GB
We omit the details of our implementation on
TelosB motes due to lack of space.
4 CONCLUSIONS
We presented a secret key distribution scheme for
large sensor networks. Unlike (Eschenauer and
Gligor, 2002) and (Du et al., 2005), this is not a prob-
abilistic scheme, i.e. any two nodes that can reach
each other can communicate securely with probabil-
ity one, using a small number of pre-stored keys and
without the need for establishing path-keys albeit at
the expense of a mobile node for bootstrapping. Since
our protocol and its extensions can easily accommo-
date for additional nodes, new keys and secured links,
we deem the proposed network coding approach to be
well suited for dynamic sensor networks with strin-
gent memory and processing restrictions. Extensions
for group keys, extra keys request and revocation can
be implemented and will be reported elsewhere.
Although our use of network coding was limited
to XOR operations, more powerful schemes are likely
to result from using linear combinations of the stored
keys. Investigating the potential of random linear net-
work coding (Lima et al., 2007) in the context of se-
cret key distribution is one of the main objectives of
our ongoing work.
REFERENCES
Deb, S., Effros, M., Ho, T., Karger, D., Koetter, R., Lun, D.,
Medard, M., and Ratnakar, N. (2005). Network cod-
ing for wireless applications: A brief tutorial. Proc. of
IWWAN, London, UK, May.
Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J.,
and Khalili, A. (2005). A pairwise key predistribution
scheme for wireless sensor networks. ACM Trans. Inf.
Syst. Secur., 8(2):228–258.
Eschenauer, L. and Gligor, V. D. (2002). A key-
management scheme for distributed sensor networks.
In CCS ’02: Proceedings of the 9th ACM conference
on Computer and communications security, pages 41–
47, New York, NY, USA. ACM Press.
Fragouli, C., Boudec, J.-Y. L., and Widmer, J. (2006). Net-
work coding: an instant primer. SIGCOMM Comput.
Commun. Rev., 36(1):63–68.
Lima, L., M
´
edard, M., and Barros, J. (2007). Random Lin-
ear Network Coding: A Free Cipher? In Proc. of the
IEEE International Symposium on Information The-
ory (ISIT).
Malan, D., Welsh, M., and Smith, M. (2004). A public-
key infrastructure for key distribution in tinyos based
on elliptic curve cryptography. In First IEEE Interna-
tional Conference on Sensor and Ad Hoc Communi-
cations and Network, Santa Clara, California.
Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., and Culler,
D. E. (2002). SPINS: Security protocols for sensor
networks. Wireless Networks, 8(5):521–534.
Stajano, F. (2002). Security for Ubiquitous Computing.
John Wiley and Sons.
Stajano, F. and Anderson, R. J. (1999). The resurrect-
ing duckling: Security issues for ad-hoc wireless net-
works. In Christianson, B., Crispo, B., Malcolm, J. A.,
and Roe, M., editors, Security Protocols Workshop,
volume 1796 of Lecture Notes in Computer Science,
pages 172–194. Springer.
Zhu, S., Setia, S., and Jajodia, S. (2003). LEAP: efficient
security mechanisms for large-scale distributed sensor
networks. In CCS ’03: Proceedings of the 10th ACM
conference on Computer and communications secu-
rity, pages 62–72, New York, NY, USA. ACM Press.
SECRYPT 2007 - International Conference on Security and Cryptography
174