A Key Management Scheme for Commodity Sensor Networks

  • Yong Ho Kim
  • Mu Hyun Kim
  • Dong Hoon Lee
  • Changwook Kim
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3738)


To guarantee secure communication in wireless sensor networks, secret keys should be securely established between sensor nodes. Recently, a simple key distribution scheme has been proposed for pair-wise key establishment in sensor networks by Anderson, Chan, and Perrig. They defined a practical attack model for non-critical commodity sensor networks. Unfortunately, the scheme is vulnerable under their attack model. In this paper, we describe the vulnerability in their scheme and propose a modified one. Our scheme is secure under their attack model and the security of our scheme is proved. Furthermore, our scheme does not require additional communication overhead nor additional infrastructure to load potential keys into sensor nodes.


security key management wireless sensor networks 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Anderson, R., Chan, H., Perrig, A.: Key Infection: Smart Trust for Smart Dust. In: 12th IEEE International Conference on Network Protocols (October 2004)Google Scholar
  2. 2.
    Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Communications Magazine 40(8), 102–114 (2002)CrossRefGoogle Scholar
  3. 3.
    Bellare, M., Kilian, J., Rogaway, P.: The security of the cipher block chaining message authentication code. Journal of Computer and System Sciences 61(3), 362–399 (2000)zbMATHCrossRefMathSciNetGoogle Scholar
  4. 4.
    Blom, R.: An optimal class of symmetric key generation systems. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 335–338. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  5. 5.
    Blundo, C., Santis, A.D., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 471–486. Springer, Heidelberg (1993)Google Scholar
  6. 6.
    Carman, D.W., Kruus, P.S., Matt, B.J.: Constraints and approaches for distributed sensor network security, NAI Labs Technical Report 00-010 (September 2000)Google Scholar
  7. 7.
    Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, pp. 197–213 (May 2003)Google Scholar
  8. 8.
    Chan, H., Perrig, A.: Security and Privacy in Sensor Networks. IEEE Computer 36(10), 103–105 (2003)Google Scholar
  9. 9.
    Du, W., Deng, J., Han, Y.S., Chen, S., Varshney, P.K.: A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge. In: Proceedings of the IEEE INFOCOM 2004, pp. 586–597 (March 2004)Google Scholar
  10. 10.
    Du, W., Deng, J., Han, Y.S., Varshney, P.K., Katz, J., Khalili, A.: A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks, Accepted by ACM Transactions on Information and System Security (2005)Google Scholar
  11. 11.
    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and communications security, pp. 41–47 (November 2002)Google Scholar
  12. 12.
    Liu, D., Ning, P., Li, R.: Establishing Pairwise Keys in Distributed Sensor Networks. To appear in ACM Transactions on Information and System Security (April 2004)Google Scholar
  13. 13.
    Perrig, A., Szewczyk, R., Wen, V., Cullar, D., Tygar, J.D.: SPINS: Security protocols for sensor networks. In: Proceedings of the 7th Annual ACM/IEEE Internation Conference on Mobile Computing and Networking, pp. 189–199 (July 2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Yong Ho Kim
    • 1
  • Mu Hyun Kim
    • 1
  • Dong Hoon Lee
    • 1
  • Changwook Kim
    • 2
  1. 1.Center for Information Security Technologies (CIST)Korea UniversitySeoulKorea
  2. 2.School of Computer ScienceUniversity of OklahomaNormanUSA

Personalised recommendations