2nd International IEEE Conference on Communication System Software and Middleware

Research Article

Location dependent key management in sensor networks without using deployment knowledge

  • @INPROCEEDINGS{10.1109/COMSWA.2007.382602,
        author={ Farooq  Anjum},
        title={Location dependent key management in sensor networks without using deployment knowledge},
        proceedings={2nd International IEEE Conference on Communication System Software and Middleware},
        publisher={IEEE},
        proceedings_a={COMSWARE},
        year={2007},
        month={7},
        keywords={Analytical models  Batteries  Costs  Knowledge management  Proposals  Public key cryptography  Sensor phenomena and characterization  Target tracking  Technology management  Wireless sensor networks},
        doi={10.1109/COMSWA.2007.382602}
    }
    
  • Farooq Anjum
    Year: 2007
    Location dependent key management in sensor networks without using deployment knowledge
    COMSWARE
    IEEE
    DOI: 10.1109/COMSWA.2007.382602
Farooq Anjum1
  • 1: Telcordia Technologies

Abstract

In this paper we propose an approach for key management in sensor networks which takes the location of sensor nodes into consideration while deciding the keys to be deployed on each node. As a result, this approach not only reduces the number of keys that have to be stored on each sensor node but also provides for the containment of node compromise. Thus compromise of a node in a location affects the communications only around that location. This approach which we call as location dependent key management does not require any knowledge about the deployment of sensor nodes. The proposed scheme starts off with loading a single key on each sensor node prior to deployment. The actual keys are then derived from this single key once the sensor nodes are deployed. The proposed scheme allows for additions of sensor nodes to the network at any point in time. We study the proposed scheme using both analysis and simulations and point out the advantages.