A two-layer key establishment scheme for wireless sensor networks

Yun Zhou, Yuguang Fang

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

42 Citations (Scopus)

Abstract

In a large scale sensor network, it is infeasible to assign a unique Transport Layer Key (TLK) for each pair of nodes to provide the end-to-end security due to the huge memory cost per node. Thus, conventional key establishment schemes follow a key predistribution approach to establish a Link Layer Key (LLK) Infrastructure between neighboring nodes and rely on multihop paths to provide the end-to-end security. Their drawbacks Include vulnerability to the node compromise attack, large memory cost, and energy inefficiency in the key establishment between neighboring nodes. In this paper, we propose a novel key establishment scheme, called LAKE, for sensor networks. LAKE uses a i-degree trivariate symmetric polynomial to facilitate the establishment of both TLKs and LLKs between sensor nodes in a two-dimensional space, where each node can calculate direct TLKs and LLKs with some logically neighboring nodes and rely on those nodes to negotiate indirect TLKs and LLKs with other nodes. Any two end nodes can negotiate a TLK on demand directly or with the help of only one Intermediate node, which can be determined in advance. As for the LLK establishment, LAKE is more secure under the node compromise attack with much less memory cost than conventional solutions. Due to the location-based deployment, LAKE is also energy efficient in that each node has direct LLKs with most neighbors without spending too much energy on the establishment of indirect LLKs with neighbors through multihop routing. © 2007 IEEE.
Original languageEnglish
Pages (from-to)1009-1020
JournalIEEE Transactions on Mobile Computing
Volume6
Issue number9
DOIs
Publication statusPublished - Sept 2007
Externally publishedYes

Bibliographical note

Publication details (e.g. title, author(s), publication statuses and dates) are captured on an “AS IS” and “AS AVAILABLE” basis at the time of record harvesting from the data source. Suggestions for further amendments or supplementary information can be sent to [email protected].

Research Keywords

  • Key establishment
  • Link layer
  • Node compromise
  • Sensor networks
  • Transport layer

Fingerprint

Dive into the research topics of 'A two-layer key establishment scheme for wireless sensor networks'. Together they form a unique fingerprint.

Cite this