SAKE - Secure Authenticated Key Establishment in Sensor Networks
Muhammad Yasir, Mureed Hussain, Kahina Kabri, Dominique Seret
2008
Abstract
Master key schemes are a viable solution to establish pairwise shared secret keys in wireless sensor networks. In these schemes, a master key is preconfigured into each sensor node which is then used by each node to generate pairwise shared secret keys. In the literature so far, it is essential for each sensor node to keep master key in its memory during the entire phase of key setup. As soon as key setup completes, each node erases the master key from its memory. Although key setup phase of a node lasts for a small interval of time, it is not impossible for an adversary to compromise a node during this time. In this situation, the presence of master key can be disastrous. So the challenge is to protect a sensor network from compromise of master key during its key setup phase. We propose Secure Authenticated Key Establishment (SAKE) protocol that meets the above challenge by introducing an idea that master key need not to be kept by a sensor node for the entire key setup phase thereby shortening the master key compromise window. With the help of our proposed scheme, other attacks during key setup phase can also be avoided.
References
- R. Anderson, H. Chan, and A. Perrig, “Key infection: Smart trust for smart dust,” In 12th IEEE International Conference on Network Protocols, Berlin, Germany, 2004.
- J. Deng, C Hartung, R. Han, and S. Mishra, “A Practical Study of Transitory Master Key Establishment for Wireless Sensor Networks,” University of Colorado at Boulder, Boulder, CO, 80309-0430.
- S. Zhu, S. Setia, and S. Jajodia, “Leap: Efficien security mechanisms for large-scale distributed sensor networks,” In 10th ACM Conference on Computer and Communication Security, Washington D.C, USA, 2003
- L. Eschenaur and V. Gligor, “A key-management scheme for distributed sensor networks,” In Proceedings of the 9th ACM Conference on Computer and Communication Security, pp. 41-47, 2002.
- S. Sarsan and V.G. Adadda, “Analysis and Evaluation of Key Management Schemes in Wireless Sensor Networks,” 2004.
- H. Chan, A. Perrig, and D. Song, “Random Key Predistribution Schemes for Sensor Networks,” In IEEE Symposium on Research in Security and Privacy, 2003.
- Du W, Deng J, Han Y S, Chen S, and Varshney P K, “A key management scheme for wireless sensor networks using deployment knowledge,” In Proceedings of IEEE INFOCOM'04, IEEE Press, Hong Kong, 2004.
- Lai, B., Kim, S., and Verbauwhede, I, “Scalable session key construction protocol for wireless sensor networks,” In IEEE Workshop on Large Scale RealTime and Embedded Systems (LARTES), 2002.
- S. Basagni, K. Herrin, E. Rosti, D. Bruschi, “Secure Pebblenets,” In Proc. of MobiHoc 2001.
- D. Carman, P. Kruus and B. Matt, “Constraints and approaches for distributed sensor network security,” NAI Labs Technical Report No. 00010 , 2000.
- A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. Tygar, “SPINS: Security Protocols for Sensor Networks,” In Proc. Of Seventh Annual ACM International Conference on Mobile Computing and Networks (Mobicom 2001), Rome Italy, 2001.
- Dutertre, B., Cheung, S., and Levy, J, “Lightweight key management in wireless sensor networks by leveraging initial trust,” Tech. Rep. SRI-SDL-04-02, System Design Laboratory, 2004.
- S. A. Camtepe and B. Yener, “Key Distribution Mechanisms for Wireless Sensor Networks: a Survey,” Rensselaer Polytechnic Institute, 2005.
Paper Citation
in Harvard Style
Yasir M., Hussain M., Kabri K. and Seret D. (2008). SAKE - Secure Authenticated Key Establishment in Sensor Networks . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008) ISBN 978-989-8111-59-3, pages 154-160. DOI: 10.5220/0001930301540160
in Bibtex Style
@conference{secrypt08,
author={Muhammad Yasir and Mureed Hussain and Kahina Kabri and Dominique Seret},
title={SAKE - Secure Authenticated Key Establishment in Sensor Networks},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)},
year={2008},
pages={154-160},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001930301540160},
isbn={978-989-8111-59-3},
}
in EndNote Style
TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)
TI - SAKE - Secure Authenticated Key Establishment in Sensor Networks
SN - 978-989-8111-59-3
AU - Yasir M.
AU - Hussain M.
AU - Kabri K.
AU - Seret D.
PY - 2008
SP - 154
EP - 160
DO - 10.5220/0001930301540160