nodes. If this key setup time completes in short time,
an adversary has very little time to eavesdrop on key
setup. Compromising a node does not offer the
adversary any added advantage in deducing these
keys. Key Infection establishes key as: every sensor
node simply decides a key and broadcasts it in
plaintext to its neighbors. For example a node i, after
deployment, broadcasts a key k
i
. Due to short-range
nature of transmission, possibly half a dozen other
nodes within range of i, notice each other’s presence
and start self-organization. Another node j after
hearing i’s signal, produces a pair wise key k
j
and
sends it, along with its name, to i:{ j, k
ji
} k
i
.
Minimum power essential for the link is used to
transmit the packet. The key k
ji
is used between i
and j. Perrig et al. argued that only 2.4% of links
will be compromised if there is one hostile sensor
node for every 100 white nodes, and there are four
neighbors in the range of each node. Plaintext key
exchange protocol does not provide protection for
confidentiality, integrity, and node authentication.
Another drawback of this approach is that an
adversary can inject malicious nodes into the
network, since there is no authentication mechanism
to verify whether a sensor node is a valid member.
In key pre-distribution schemes, secret keys or
secret information is distributed to every sensor node
prior to deployment into the sensing area. Gligor et
al. (L. Eschenaur and V. Gligor, 2002) proposed the
probabilistic key pre-deployed scheme, which is
regarded as basic scheme. In this scheme, key setup
completes in three phases: key pre-distribution,
shared-key discovery, and path-key establishment
respectively.
Figure 4 shows the key pre-distribution phase in
which each sensor node holds k distinct keys,
randomly chosen from a big key pool having size P
where P>> k. This set of k keys carried by each node
is called key ring. An identifier is attached with each
key. Shared key discovery phase starts with the
deployment of nodes in which each node discovers
its neighbors to share common keys in its radio
range. Links are established between the nodes at the
end of shared-key discovery phase. Path-key
establishment phase is the last phase in which pairs
of nodes are connected that want to establish a
secure link but they are not sharing a common key.
These pairs of nodes can be reachable by two or
more hops. Perrig et al. (H. Chan et al., 2003)
modified Gligor’s scheme for proficient handling of
bootstrapping problem. This scheme is more
resilient against node capture. In this scheme,
instead of using one common key for key
establishment, q common keys are required for key
setup with a hash function. Figure 5 demonstrates
this scheme (B. Lai, 2002).
It is possible that many nodes in the sensor
network can share that same key. If one of these
nodes is compromised, all other nodes sharing the
same key will also be compromised. Du et al. (W.
Du et al., 2004) has proposed a model, in which the
sensor nodes are deployed in groups, so in each
group the nodes have high probability to be near to
each other. So the basic idea is to let the nodes
deployed near to each other select keys from sub-
key pools that share more keys. In the scheme,
because each node carries fewer keys, the memory
efficiency and resilience are both improved.
3 SAKE: SECURE
AUTHENTICATED KEY
ESTABLISHMENT
In key establishment techniques based on master key
schemes, master key is a single point of failure.
Deng et al. (J. Deng et al.), demonstrated that time
to deploy a sensor network is very important. The
key setup phase may need to be extended until all
nodes are activated, or arrive at their destination. In
such cases, the master key would live for several
minutes. If an adversary knows the memory area
precisely from which to draw the keys, then the node
compromise time is in the tens of seconds. So it is
quite possible for an adversary to physically capture
a node and compromise the master key during its
key setup phase. The challenge in this scenario is to
protect the network from its single point of failure.
This challenge can be met if key establishment
process would be made less dependent on master
key. This can be done if the individual key of each
sensor node would be made an active participant in
key establishment process along with the master
key. This load balancing approach will protect the
master key from becoming a single point of failure.
Moreover, in a situation when master key is
compromised, it is required that a typical key
establishment technique would not enable an
adversary to compute all pairwise keys with the help
of master key.
We propose Secure Authentication Key
Establishment (SAKE) protocol, which is based on
master key scheme. SAKE supports the
establishment of pairwise shared keys between the
nodes of a sensor network. SAKE is dissimilar from
other master key schemes as it makes key
establishment less dependent on master key. Firstly,
SAKE - Secure Authenticated Key Establishment in Sensor Networks
157