International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017
p-ISSN: 2395-0072
www.irjet.net
An Analysis of Location Independent Key Pre distribution Schemes for Wireless Sensor Network Monjul Saikia1 and Md. A Hussain2 North Eastern Regional Institute of Science and Technology Nirjuli-791109, Arunachal Pradesh, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract -
i) Key Predistribution phase: A centralized server is responsible for determining the keys to be preloaded into the sensor nodes. It first generates a large set of keys called key pool. From this set, keys are loaded to the sensor nodes based on some algorithm such that with minimum number of keys high connectivity can be achieved. With the set of keys loaded into the sensor nodes forms a key chain or key ring.
Security in wireless sensor network can be
achieve by symmetric key encryption with minimum cost. The symmetric key encryption technique requires agreeing on one common secret key among two parties. Therefore it is essential to have a common key among sensor nodes. The key predistribution solves the purpose by assigning secret keys among sensor nodes. Due to high chance of physical capture of sensor nodes and lack of prior information of configuration after deployment makes key predistribution more challenging. Several key predistribution schemes have been proposed. In this paper we try to discuss the basics of key predistribution scheme and analyze different schemes proposed by researchers, along with some experimental results. Also we have discussed the properties need to be fulfilled for an efficient scheme.
ii) Sensor Deployment phase: After keys are loaded to the sensor nodes these nodes are ready to deploy in target area. Number of sensors within the communication range (n') is usually much smaller than the deployed nodes (N). Therefore, it is obvious that storing a common key which is not in communication range may lead to unnecessary storage for the sensor nodes.
Keywords: Sensor Network; KPS; Security; Connectivity; Resilience.
iii) Shared Key Discovery phase: If a sensor node wants to communicate to other sensor node within its communication range, then they look up into their key chain for the preloaded common secret key. This phase is called a shared key discovery phase.
1. INTRODUCTION The main objective of a WSN is to collect sensitive information from the physical world where human cannot survive. These networks of tiny devices can operate in any locations where wired network is possible. The wireless sensor networks are deployed to sense, process and distribute information of some target physical environments. Deployment strategy may dependent to the location of each sensor node or may be independent of the location. The deployment environment can be a controlled one or an uncontrolled. Security of sensor nodes is highly important when deployed in an uncontrolled environment as there may be high chance of node compromise by adversary.
iv) Pair-wise Key Establishment phase: After discovering a shared key secure communication can progress with successive symmetric key encryption process. On the other hand if a node does have a pair-wise key with a destination node, the sensor node has to find a key path to setup their pair-wise key for secure communication with some routing mechanism.
3. EXISTING KEY DISTRIBUTION SCHEMES Here we will discuss in details the various key predistribution schemes. Starting with a random key predistribution scheme proposed by Eschenauer and Gligor in 2002 a numerous number of schemes have been invented there after. Some of the location independent KPS is listed in the table-1. The schemes are said to be location
2. KEY DISTRIBUTION SCHEMES FOUNDATIONS The fundamental model for security for sensor network with Key Predistribution Schemes can be devided into four phases, namely i) ii) iii) iv)
Š 2017, IRJET
independent in the sense that no prior information is available regarding location/coordinates of the sensor nodes prior to deployment.
Key Predistribution phase Sensor Deployment phase Shared Key Discovery phase Pairwise Key Establishment phase
|
Impact Factor value: 5.181
|
ISO 9001:2008 Certified Journal
| Page 1958