3rd International ICST Conference on Security and Privacy in Communication Networks

Research Article

RoK: A robust key pre-distribution protocol for multi-phase wireless sensor networks

  • @INPROCEEDINGS{10.1109/SECCOM.2007.4550354,
        author={Claude Castelluccia and  Angelo  Spognardi},
        title={RoK: A robust key pre-distribution protocol for multi-phase wireless sensor networks},
        proceedings={3rd International ICST Conference on Security and Privacy in Communication Networks},
        publisher={IEEE},
        proceedings_a={SECURECOMM},
        year={2008},
        month={6},
        keywords={Communication system security  Cryptographic protocols  Degradation  Energy efficiency  Public key cryptography  Remuneration  Robustness  Sensor phenomena and characterization  Wireless application protocol  Wireless sensor networks},
        doi={10.1109/SECCOM.2007.4550354}
    }
    
  • Claude Castelluccia
    Angelo Spognardi
    Year: 2008
    RoK: A robust key pre-distribution protocol for multi-phase wireless sensor networks
    SECURECOMM
    IEEE
    DOI: 10.1109/SECCOM.2007.4550354
Claude Castelluccia1,*, Angelo Spognardi2,*
  • 1: INRIA - Rhone-Alpes, Inovallee - 655 avenue de l’Europe 38 330 Montbonnot Saint Ismier, FRANCE
  • 2: Dipartimento di Informatica Universita di Roma “La Sapienza” ` Via Salaria 113, 00198 - Roma, ITALY
*Contact email: claude.castelluccia@inrialpes.fr, spognardi@di.uniromal.it

Abstract

Wireless sensor networks are usually deployed to operate for a long period of time. Because nodes are batteryoperated, they eventually run out of power and new nodes need to be periodically deployed to assure network connectivity. This type of networks is referred to as Multi-phase WSN in the literature [1]. Current key pre-distribution schemes, such as [2] and [3], are not adapted to multi-stage WSN. With these schemes, the security of the WSN degrades with time, since the proportion of corrupted links gradually increases. In this paper, we propose a new pre-distribution scheme adapted to multi-phase WSN. In the proposed scheme, the pre-distributed keys have limited lifetimes and are refreshed periodically. As a result, a network that is temporarily attacked (i.e. the attacker is active only during a limited amount of time) automatically self-heals, i.e. recovers its initial state when the attack stops. In contrast, with existing schemes, an attacker that corrupts a certain amount of nodes compromises a given fraction of the total number of secure channels. This ratio remains constant until the end of the network, even if the attacker stops its action. Furthermore, with our scheme, a network that is constantly attacked (i.e. the attacker regularly corrupts nodes of the network, without stopping) is much less impacted than a network that uses existing key pre-distribution protocols. With these schemes, the number of compromised links constantly increases until all the links are compromised. With our proposal, the proportion of compromised links is limited and constant.