SecLEACH – A Random Key Distribution Solution for Securing Clustered Sensor Networks
Wireless sensor networks are ad hoc networks comprised mainly of small sensor nodes with limited resources, and can be used to monitor areas of interest. Recent work has shown that clustered sensor networks can increase system throughput, decrease system delay, and save energy. In this paper, we show that random key predistribution, first proposed and studied in the context of flat wireless sensor networks, is a very attractive key distribution solution for clustered sensor networks with rotating cluster heads, such as LEACH.
G. J. Pottie and W. J. Kaiser. Wireless integrated network sensors. Commun. ACM, 43(5):51-58, 2000.
C. Karlof and D. Wagner. Secure routing in wireless sensor networks: Attacks and countermeasures. Elsevier's AdHoc Networks Journal, Special Issue on Sensor Network Applications and Protocols, 1(2-3):293-315, September 2003.
A. D. Wood and J. A. Stankovic. Denial of service in sensor networks. IEEE Computer, 35(10):54-62, October 2002.
D. W. Carman, P. S. Kruus, and B. J. Matt. Constraints and approaches for distributed sensor network security. Technical report, NAI Labs, The Security Research Division, Network Associates, Inc., [link], 2000.
L. Eschenauer and V. D. Gligor. A key management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on Computer and communications security, pages 41-47. ACM Press, 2002.
H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy, page 197. IEEE Computer Society, may 2003.
S. Zhu, S. Setia, and S. Jajodia. Leap: efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of the 10th ACM conference on Computer and communication security, pages 62-72. ACM Press, 2003.
D. Liu and P. Ning. Establishing pairwise keys in distributed sensor networks. In 10th ACM Conference on Computer and Communications Security (CCS '03), pages 52-61, 2003.
D. Liu and P.Ning. Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In 10th Annual Network and Distributed Systems Security Symposium (NDSS'03), pages 263-276, 2003.
D. Liu and P. Ning. Location-based pairwise key establishments for static sensor networks. In 1st ACM workshop on Security of ad hoc and sensor networks (SASNí03), pages 72-82. ACM Press, 2003.
W. Du, J. Deng, Y. S. Han, and P. K. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. In 10th ACM conference on Computer and communication security (CCSí03), pages 42-51. ACM Press, October 2003.
Q. Huang, J. Cukier, H. Kobayashi, B. Liu, and J. Zhang. Fast authenticated key establishment protocols for self-organizing sensor networks. In 2nd ACM international conference on Wireless sensor networks and applications (WSNA'03), pages 141-150. ACM Press, 2003.
W. Du, J. Deng, Y. S. Han, S. Chen, and P. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In IEEE INFOCOM'04,, 2004.
D. Huang, M. Mehta, D. Medhi, and L. Harn. Location-aware key management scheme for wireless sensor networks. In 2nd ACM workshop on Security of ad hoc and sensor networks (SASN'04), pages 29-42. ACM Press, 2004.
S. Zhu, S. Xu, S. Setia, and S. Jajodia. Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach. In 11th IEEE International Conference on Network Protocols (ICNP'03), page 326, Atlanta, USA, November 2003. IEEE Computer Society.
R. Kannan, L. Ray, and A. Durresi. Efficient key pre-distribution schemes for sensor networks. In 1st European Workshop on Security in Wireless and Ad-Hoc Sensor Networks (ESASí 04), Heidelberg, Germany, August 2004.
J. Hwang and Y. Kim. Revisiting random key pre-distribution schemes for wireless sensor networks. In 2nd ACM workshop on Security of ad hoc and sensor networks, pages 43-52. ACM Press, 2004.
Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks., Sophia Antipolis, France, September 2004. Lecture Notes in Computer Science.
J. L. Hill and D. E. Culler. Mica: A wireless platform for deeply embedded networks. IEEE Micro, 22(6):12-24, 2002.
Crossbow Technology, Inc., 41 Daggett Dr., San Jose, CA 95134. MPR/MIB Mote Hardware Users Manual - Document 7430-0021-05, December 2003.
Sameer Tilak, Nael B. Abu-Ghazaleh, and Wendi Heinzelman. A taxonomy of wireless micro-sensor network models. ACM Mobile Computing and Communications Review, 6(2):28-36, April 2002.
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. A survey on sensor networks. IEEE Communications Magazine, 40(8):102-114, August 2002.
Edgar H., Jr. Callaway, and Edgar H. Callaway. Wireless Sensor Networks: Architectures and Protocols. CRC Press, hardcover edition, August 2003.
W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan. Energy-efficient communication protocol for wireless microsensor networks. In IEEE Hawaii Int. Conf. on System Sciences, pages 4-7, january 2000.
A. Manjeshwar and D. Agrawal. Teen: A routing protocol for enhanced effeciency in wireless sensor networks. In 1st International Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile Computing, 2001.
O. Younis and S. Fahmy. Distributed clustering in ad-hoc sensor networks: A hybrid, energy-efficient approach," ieee infocom, march 2004. In IEEE INFOCOM, pages 629-640, March 2004.
Qing Fang, Feng Zhao, and Leonidas Guibas. Lightweight sensing and communication protocols for target enumeration and aggregation. In 4th ACM international symposium on Mobile ad hoc networking & computing (MOBICHOCí 03), pages 165-176. ACM Press, 2003.
A. Iwata, C. Chiang, G. Pei, M. Gerla, and T. Chen. Scalable routing strategies for ad-hoc wireless networks. IEEE Journal on Selected Areas in Communications, 17(8):1369-1379, Aug. 1999. Special Issue on Ad-Hoc Networks.
B. Schneier. Applied Cryptography. Wiley, second edition, 1996.
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. Wireless Networks, 8(5):521-534, September 2002.
A. C. Ferreira, M. A. Vilaça, L. B. Oliveira, E. Habib, H. C. Wong, and A. A. Loureiro. On the security of cluster-based communication protocols for wireless sensor networks. In 4th IEEE International Conference on Networking (ICN'05), volume 3420 of Lecture Notes in Computer Science, pages 449-458, Reunion Island, April 2005. Springer.
Jason Hill, Robert Szewczyk, Alec Woo, Seth Hollar, David Culler, and Kristofer Pister. System architecture directions for networked sensors. In Proceedings of the ninth international conference on Architectural support for programming languages and operating systems, pages 93-104. ACM Press, 2000.
C. Karlof, N. Sastry, and D. Wagner. Tinysec: A link layer security architecture for wireless sensor networks. In Second ACM Conference on Embedded Networked Sensor Systems (SensSys 2004), November 2004.
B. Przydatek, D. Song, and A. Perrig. SIA: Secure information aggregation in sensor networks. In ACM SenSys 2003, Nov 2003.
F. Yea, H. Luo, S. Lu, and L. Zhang. Statistical en-route filtering of injected false data in sensor networks. In INFOCOM 2004, 2004.
M. Bohge and W. Trappe. An authentication framework for hierarchical ad hoc sensor networks. In Proceedings of the 2003 ACM workshop on Wireless security, pages 79-87. ACM Press, 2003.
Leonardo B. Oliveira, Hao Chi Wong, and Antonio A. F. Loureiro. Lha-sp: Secure protocols for hierarchical wireless sensor networks. In 9th IFIP/IEEE International Symposium on Integrated Network Management (IM'05), pages 31-44, Nice, France, May 2005.
Philip J. Clark and Francis C. Evans. Distance to nearest neighbor as a measure of spatial relationships in populations. Ecology, 35(4):445-53, 1954.
K. P. Donnelly. Simulations to determine the variance and edge effect of total nearest neighbour distance (ed. by i. hodder), 1978. Simulation Studies in Archaeology.