Efficient Mechanisms for Secure Inter-node and Aggregation Processing in Sensor Networks

  • Tassos Dimitriou
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3738)


In this work we present a protocol for key establishment in wireless sensor networks. Our protocol is designed so that it supports security of data with various sensitivity levels. In particular, the protocol allows the establishment of a key that can be used for communication with the base station, pairwise keys that can be used to communicate with immediate neighbors and keys that allow for secure in-network processing. This last form of operation includes both secure aggregation and dissemination processing and is beneficial to sensor networks as it saves energy and increases network lifetime. Our proposed protocol is simple and scalable and exhibits resiliency against node capture and replication as keys are localized. Furthermore, our protocol allows for incremental addition of new nodes and revocation of compromised ones, while at the same time offers efficiency in terms of computation, communication and storage overhead.


Sensor Network Sensor Node Wireless Sensor Network Message Authentication Code Hash Chain 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Carman, D., Kruus, P., Matt, B.J.: Constraints and approaches for distributed sensor network security. Tech. Rep. 00-010, NAI Labs (June 2000)Google Scholar
  2. 2.
    Intanagonwiwat, C., Govindan, R., Estrin, D., Heidemann, J., Silva, F.: Directed diffusion for wireless sensor networking. ACM/IEEE Transactions on Networking 11 (February 2002)Google Scholar
  3. 3.
    Basagni, S., Herrin, K., Bruschi, D., Rosti, E.: Secure pebblenet. In: Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking & Computing, MobiHoc 2001, pp. 156–163 (October 2001)Google Scholar
  4. 4.
    Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and communications security, pp. 41–47 (2002)Google Scholar
  5. 5.
    Chan, H., Perrig, A., Song, D.: Random key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, pp. 197–213 (May 2003)Google Scholar
  6. 6.
    Liu, D., Ning, P.: Establishing pairwise keys in distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communication Security, pp. 52–61 (October 2003)Google Scholar
  7. 7.
    Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM conference on Computer and communication security, pp. 42–51 (October 2003)Google Scholar
  8. 8.
    Zhu, S., Setia, S., Jajodia, S.: LEAP: efficient security mechanisms for large-scale distributed sensor networks. In: Proceedings of the 10th ACM Conference on Computer and Communication Security, pp. 62–72 (October 2003)Google Scholar
  9. 9.
    Deng, J., Han, R., Mishra, S.: Security Support for in-network Processing in Wireless Sensor Networks. In: ACM Workshop on Security of Adhoc Networks, SASN (2003)Google Scholar
  10. 10.
    Jolly, G., Kuscu, M., Kokate, P., Younis, M.: A Low-Energy Key Management Protocol for Wireless Sensor Networks. In: Proc. 8th International Symposium on Computers and Communication (2003)Google Scholar
  11. 11.
    Law, Y.W., Corin, R., Etalle, S., Hartel, P.H.: A formally verified decentralized key management architecture for wireless sensor networks. In: Conti, M., Giordano, S., Gregori, E., Olariu, S. (eds.) PWC 2003. LNCS, vol. 2775, pp. 27–39. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  12. 12.
    Slijepcevic, S., Potkonjak, M., Tsiatsis, V., Zimbeck, S., Srivastava, M.: On communication security in wireless ad-hoc sensor networks. In: 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 139–144 (June 2002)Google Scholar
  13. 13.
    Anderson, R., Kuhn, M.: Tamper resistance – a cautionary note. In: Proceedings of the Second Usenix Workshop on Electronic Commerce, pp. 1–11 (November 1996)Google Scholar
  14. 14.
    Przydatek, B., Song, D., Perrig, A.: SIA: Secure Information Aggregation in Sensor Networks. In: ACM SensSys. (2003)Google Scholar
  15. 15.
    Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.: SPINS: Security Protocols for Sensor Networks. In: Proc. of Seventh Annual ACM International Conference on Mobile Computing and Networks(Mobicom 2001) (2001)Google Scholar
  16. 16.
    Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier’s Ad Hoc Network Journal, Special Issue on Sensor Network Applications and Protocols 1, 293–315 (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Tassos Dimitriou
    • 1
  1. 1.Athens Information TechnologyAthensGreece

Personalised recommendations