- Research Article
- Open access
- Published:
SeGrid: A Secure Grid Framework for Sensor Networks
EURASIP Journal on Wireless Communications and Networking volume 2006, Article number: 090652 (2006)
Abstract
In this paper, we propose SeGrid, a secure framework for establishing grid keys in low duty cycle sensor networks, for which establishing a common key for each pair of neighboring sensors is unnecessary since most sensors remain in sleep mode at any instant of time. SeGrid intends to compute a shared key for two grids that may be multihop away. This design explores the fact that for most applications, closer grids have higher probability and desire for secure message exchange. SeGrid relies on the availability of a low-cost public cryptosystem. The query and update of the corresponding public shares are controlled by a novel management protocol such that the closer the two grids, the shorter the distance to obtain each other's public share. We instantiate SeGrid based on Blom's key establishment to illustrate the computation of a grid key.
References
Liu W, Fang Y: SPREAD: enhancing data confidentiality in mobile ad hoc networks. Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '04), March 2004, HongKong 4: 2404-2413.
Shi E, Perrig A: Designing secure sensor networks. IEEE Wireless Communications 2004,11(6):38-43. 10.1109/MWC.2004.1368895
Zhang Y, Liu W, Lou W: Anonymous communications in mobile ad hoc networks. Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '05), March 2005, Miami, Fla, USA
Carman DW, Kruus PS, Matt BJ: Constraints and approaches for distributed sensor network security. Tech. Rep. 00-010 September 2000.
An F, Cheng X, Rivera M, Li J, Cheng Z: PKM: a pairwise key management scheme for wireless sensor networks. International Conference on Computer Networks and Mobile Computing (ICCNMC '05), August 2005, Zhangjiajie, China
Chan H, Perrig A, Song D: Random key predistribution schemes for sensor networks. Proceedings of the IEEE Symposium on Security and Privacy, May 2003, Berkeley, Calif, USA 197-213.
Du W, Deng J, Han Y, Varshney PK: A pairwise key pre-distribution scheme for wireless sensor networks. Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), October 2003, Washington, DC, USA 42-51.
Du W, Deng J, Han YS, Chen S, Varshney PK: A key management scheme for wireless sensor networks using deployment knowledge. Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '04), March 2004, Hong Kong 1: 597.
Eschenauer L, Gligor VD: A key-management scheme for distributed sensor networks. Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS '02), November 2002, Washington, DC, USA 41-47.
Liu D, Ning P: Establishing pairwise keys in distributed sensor networks. Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), October 2003, Washington, DC, USA 52-60.
Zhu S, Xu S, Setia S, Jajodia S: Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach. Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP '03), November 2003, Atlanta, Ga, USA 326-335.
Xu Y, Heidemann J, Estrin D: Geography-informed energy conservation for ad hoc routing. Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, July 2001, Rome, Italy 70-84.
Blom R: An optimal class of symmetric key generation systems. Proceedings of the Workshop on Theory and Application of Cryptographic Techniques (EUROCRYPT '84), April 1985, Paris, France 209: 335-338.
Chen B, Jamieson K, Balakrishnan H, Morris R: An energy efficient coordination algorithm for topology maintenance in ad hoc wireless networks. Proceedings of the ACM SIGMOBILE Annual International Conference on Mobile Computing and Networking, July 2001, Rome, Italy 85-96.
Ma L, Zhang Q, Cheng X: A Power Controlled Interference Aware Routing Protocol for Dense Multi-Hop Wireless Networks. submitted
Cerpa A, Estrin D: ASCENT: adaptive self-configuring sensor networks topologies. Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '02), June 2002, New York, NY, USA 3: 1278-1287.
Christine EJ, Krishna MS, Agrawal P, Chen JC: A survey of energy efficient network protocols for wireless networks. Wireless Networks 2001,7(4):343-358. 10.1023/A:1016627727877
Ye W, Heidemann J, Estrin D: An energy-efficient MAC protocol for wireless sensor networks. Proceedings of the 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '02), June 2002, New York, NY, USA 3: 1567-1576.
Ding M, Chen D, Xing K, Cheng X: Localized fault-tolerant event boundary detection in sensor networks. Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '05), March 2005, Miami, Fla, USA 2: 902-913.
Ding M, Chen D, Thaeler A, Cheng X: Fault-tolerant target detection in sensor networks. Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '05), March 2005, New Orleans, La, USA 4: 2362-2368.
Chan H, Perrig A: PIKE: peer intermediaries for key establishment in sensor networks. Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '05), March 2005, Miami, Fla, USA 1: 524-535.
Liu D, Ning P, Du W: Group-based key pre-distribution in wireless sensor networks. ACM Workshop on Wireless Security (Wise '05), September 2005, Cologne, Germany 11-20.
Zhou L, Ni J, Chinya , Ravishankar V: Efficient key establishment for group-based wireless sensor deployments. ACM Workshop on Wireless Security (Wise '05), September 2005, Cologne, Germany 1-10.
Blundo C, Santis AD, Herzberg A, Kutten S, Vaccaro U, Yung M: Perfectly-secure key distribution for dynamic conferences. In Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '92), August 1992, Santa Barbara, Calif, USA, Lecture Notes in Computer Science Edited by: Brickell EF. 740: 471-486.
Du W, Wang R, Ning P: An efficient scheme for authenticating public keys in sensor networks. Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '05), May 2005, Urbana-Champaign, Ill, USA 58-67.
Ma L, Liu F, Cheng X, An F, Li J: iPAK: an in-situ pairwise key bootstrapping scheme for wireless sensor networks. submitted to ACM MOBIHOC 2006
Liu F, Cheng X: SBK: a self-configuring framework for bootstrapping keys in sensor networks. submmitted to ACM MOBIHOC
Menezes AJ, Oorscho PCV, Vanstone SA: Handbook of Applied Cryptography. CRC Press, Boca Raton, Fla, USA; 2001.
Cheng X, Thaeler A, Xue G, Chen D: TPS: a time-based positioning scheme for outdoor wireless sensor networks. Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '04), March 2004, Hong Kong 4: 2685-2696.
Liu F, Cheng X, Hua D, Chen D: TPSS: a time-based positioning scheme for sensor networks with short range beacons. Proceedings of the International Conference on Computer Networks and Mobile Computing (ICCNMC '05), August 2005, Zhangjiajie, China 33-42.
Thaeler A, Ding M, Cheng X: iTPS: an improved location discovery scheme for sensor networks with long-range beacons. Journal of Parallel and Distributed Computing 2005,65(2):98-106. Special issue on theoretical and algorithmic aspects of sensor, Ad Hoc wireless, and Peer-to-Peer networks
Boukerche A, Cheng X, Linus J: Energy-aware data-centric routing in microsensor networks. Proceedings of the 6th ACM International Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM '03), September 2003, San Diego, Calif, USA 42-49.
Diffie W, Hellman M: New directions in cryptography. IEEE Transactions on Information Theory 1976,22(6):644-654. 10.1109/TIT.1976.1055638
Karp B, Kung HT: GPSR: greedy perimeter stateless routing for wireless networks. Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM '00), August 2000, Boston, Mass, USA 243-254.
Boneh D, Franklin M: Identity based encryption from the Weil pairing. Proceedings of the 21st Annual International Cryptology Conference (CRYPTO '01), August 2001, Santa Barbara, Calif, USA 213-229.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License ( https://creativecommons.org/licenses/by/2.0 ), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
About this article
Cite this article
Cheng, X., Liu, F. & An, F. SeGrid: A Secure Grid Framework for Sensor Networks. J Wireless Com Network 2006, 090652 (2006). https://doi.org/10.1155/WCN/2006/90652
Received:
Accepted:
Published:
DOI: https://doi.org/10.1155/WCN/2006/90652