ChinaCom2008-Network and Information Security Symposium

Research Article

Random Key Management Using Group Deployment in Large-scale Sensor Networks

  • @INPROCEEDINGS{10.1109/CHINACOM.2008.4685233,
        author={Ting Yuan and Jianqing Ma and Shiyong Zhang},
        title={Random Key Management Using Group Deployment in Large-scale Sensor Networks},
        proceedings={ChinaCom2008-Network and Information Security Symposium},
        publisher={IEEE},
        proceedings_a={CHINACOM2008-NIS},
        year={2008},
        month={11},
        keywords={},
        doi={10.1109/CHINACOM.2008.4685233}
    }
    
  • Ting Yuan
    Jianqing Ma
    Shiyong Zhang
    Year: 2008
    Random Key Management Using Group Deployment in Large-scale Sensor Networks
    CHINACOM2008-NIS
    IEEE
    DOI: 10.1109/CHINACOM.2008.4685233
Ting Yuan1,*, Jianqing Ma1,*, Shiyong Zhang1,*
  • 1: Department of Computing and Information Technology Fudan University Shanghai, 200433, China
*Contact email: 061021081@fudan.edu.cn, jqma@fudan.edu.cn, szhang@fudan.edu.cn

Abstract

Dynamics of sensor networks make security one of the top issues we should pay attention to. Sensor networks can be deployed in hostile environments where their nodes are easy to be captured or re-programmed for deleterious use by an adversary. Therefore, it is necessary to protect communications between sensor nodes through cryptographic methods. To address this, symmetric key management in wireless sensor networks arises as a challenging security issue because other key management issues (e.g., asymmetric cryptography or key distribution centers) are proven undesirable for resource-limited sensor nodes. So far, several key distribution schemes have been proposed to solve key management problems. In this paper, we propose a random key management scheme, which organizes sensor nodes into groups and uses multiple key pools to achieve higher security in largescale sensor networks. Through security analysis and simulations, our scheme is shown to be better resilient against node capture than certain existing schemes.