and does not rest on computational intractability as-
sumptions beyond what is needed to establish se-
cure symmetrically encrypted channels. Even from
an information-theoretic point of view, it is possible
to use our scheme for secret key-exchange only, so
as to gain security even against a computationally un-
bounded adversary. Moreover, our scheme is light-
weight in the sense of imposing little computational
effort within each relay node. So it can be imple-
mented in cheap and power-limited devices, partic-
ularly small sensor-devices. The protocol offers two
degrees of freedom which lets us control the commu-
nication overhead and find a suitable balance between
security and communication overhead. This facili-
tates a fair-use policy of the channel, if multiple ses-
sions run concurrently over the same set of devices.
In future work, we will report on empirical evaluation
via simulation.
Unfortunately, our protocol is vulnerable to
denial-of-service attacks in its present form. The
XOR-sharing as we used is most vulnerable to cor-
rupted shares, since the secret is unrecoverable if one
share is lost or modified. However, XOR-sharing is
not a must and might be replaced by conventional
polynomial sharing that comes with better error cor-
recting facilities (e.g. Shamir’s scheme). Guarding
against loss of shares and routing attacks are subject
of future research.
This work is written with wireless networks in
mind, but the presented algorithm can work in any
network where the construction of the aforemen-
tioned layered architecture is possible. In particular,
it seems possible to apply it in wired networks like
cascades of mix servers presented in (Klonowski and
Kutylowski, 2005).
ACKNOWLEDGEMENTS
The paper was partially supported by grant S10026
from the Institute of Mathematics and Computer Sci-
ence of the Wroclaw University of Technology.
REFERENCES
Anderson, R., Chan, H., and Perrig, A. (2004). Key infec-
tion: Smart trust for smart dust. In Proc. of IEEE Int.
Conf. on Network Protocols (ICNP).
Chan, H. and Perrig, A. (2005). PIKE: peer intermediaries
for key establishment in sensor networks. In INFO-
COM 2005. Proc. of the 24th Annual Joint Conf. of
the IEEE Computer and Communications Societies.,
volume 1, pages 524–535.
Chan, H., Perrig, A., and Song, D. (2003). Random key pre-
distribution schemes for sensor networks. In Proc. of
the IEEE Symp. on Security and Privacy, pages 197–
213. IEEE Computer Society.
Cicho´n, J., Grza´slewicz, J., and Kutyłowski, M. (2009). Key
levels and securing key predistribution against node
captures. In ALGOSENSORS, pages 64–75.
Di Pietro, R., Mancini, L. V., and Mei, A. (2006). Energy
efficient node-to-node authentication and communica-
tion confidentiality in wireless sensor networks. Wirel.
Netw., 12:709–721.
Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J.,
and Khalili, A. (2005). A pairwise key predistribution
scheme for wireless sensor networks. ACM Trans. Inf.
Syst. Secur., 8(2):228–258.
Eschenauer, L. and Gligor, V. D. (2002). A key-
management scheme for distributed sensor networks.
In CCS ’02: Proc. of the 9th ACM Conf. on Computer
and communications security, pages 41–47. ACM
Press.
Franklin, M. and Wright, R. (2000). Secure communica-
tion in minimal connectivity models. J. of Cryptology,
13(1):9–30.
Jaworski, J., Ren, M., and Rybarczyk, K. (2009). Random
key predistribution for wireless sensor networks using
deployment knowledge. Computing, 85(1–2):57–76.
Klonowski, M., Koza, M., and Kutyłowski, M. (2011). How
to transmit messages via WSN in a hostile environ-
ment. In Proc. of the Int. Conf. on Security and Cryp-
tography (SECRYPT), pages 134–143. SciTePress.
Klonowski, M. and Kutylowski, M. (2005). Provable
anonymity for networks of mixes. In Information Hid-
ing, pages 26–38.
Klonowski, M., Kutyłowski, M., Ren, M., and Rybarczyk,
K. (2007). Forward-secure key evolution in wireless
sensor networks. In CANS, pages 102–120. Springer.
Perrig, A., Stankovic, J. A., and Wagner, D. (2004). Se-
curity in wireless sensor networks. Commun. ACM,
47(6):53–57.
Rass, S. and Schartner, P. (2010). A unified framework
for the analysis of availability, reliability and security,
with applications to quantum networks. IEEE Trans.
on Systems, Man, and Cybernetics – Part C: Applica-
tions and Reviews, 40(5):107–119.
Ren, M., Das, T. K., and Zhou, J. (2006). Diverging keys in
wireless sensor networks. In ISC, pages 257–269.
Yu, J. Y. and Chong, P. H. J. (2005). A survey of clustering
schemes for mobile ad hoc networks. Communica-
tions, 7(1):32–48.
OnSecureCommunicationoverWirelessSensorNetworks
367