SlideShare a Scribd company logo
An Efficient Key Distribution Scheme for Wireless Sensor Networks using polynomial based schemes 
Sanjay Kumar 1, Deepti Dohare 2 and Mahesh Kumar 3 
1 Benpour Technologies Pvt. Ltd, Dehradun, 2 Citrix Systems, Bangalore 
3 ICFAI University, Dehradun 
Abstract. Sensor Networks are highly vulnerable to attacks because, it consists of various resource- constrained devices and they communicate via wireless links. Establishment of pairwise keys between sensor nodes is used to realize many of the security services for Sensor Networks. Hence securely distributing keys among sensor nodes is a fundamental challenge in providing security services. In literature, there are two types of key distribution schemes: probabilistic and deterministic. Probabilistic schemes provide good resilience but the effect of a node capture spreads throughout the network and hence connectivity is affected. While deterministic schemes guarantee the key establishment between any pair of nodes in a network, they are less resilient to node capture. 
In this paper, we proposed a key distribution scheme based on polynomials that provide full connectivity and very good resilience to node capture. It also has low communication overhead and very less space overhead. We have also proposed a novel method for the addition of new nodes in the network. 
Keywords: Key Distribution schemes, Sensor Networks, Polynomials 
1. Introduction 
Sensor Networks have potential to provide economical solutions to many problems of practical importance. Some of the applications where Sensor Networks can be used are: Emergency Response System, Energy Management, Battlefield Management, Health Monitoring, Logistics and Inventory management etc. Sensor Networks are deployed in hostile environments. Environmental conditions along with resource- constraints give rise to many security threats or attacks. Adversary can physically capture and get the information contained in the sensor node, eavesdrop and inject new messages, modify messages, listen and analyse the messages to obtain the information contained in a message etc. Since solution to physical capture of a node is not possible, we can provide solutions to other security attacks. To defend against false data injection, authenticity of the sender must be checked so that sensors will not listen to unauthorized nodes. Modification of a message is detected by checking integrity of the message. To ensure confidentiality, the information contained in the message should not be displayed to any node other than sender and receiver. The message is sent encrypted with a key that is shared by sender and receiver. Keys play a central role in realizing security services like: authenticity, integrity, confidentiality etc. Keys need to be distributed securely among sensor nodes. For the distribution of keys, many key management schemes have been proposed in literature. 
Basically there are two types of approaches for distributing keys among sensor nodes viz. probabilistic approaches [1, 2] and deterministic approaches [3–8]. Eschenauer and Gligor [1] proposed a probabilistic key-predistribution scheme for pairwise key establishment. For each sensor node, a set of keys are chosen from a big pool of keys and given to each node before deployment. Chan et al. [2] further extended this idea and developed two key predistribution techniques: qcomposite key predistribution and random pairwise 
 Sanjay Kumar. Tel.: + 91 9412148830. 
E-mail address: sanjay_kumar@benpour.com. 
ISBN 978-1-84626-xxx-x 
2012 International Conference on Information and Network Technology (ICINT 2012) 
Chennai, India, 28-29 April, 2012, pp. xxx-xxx
scheme[2]. Thus major drawback of probabilistic key distribution scheme is that, small number of compromised nodes affects a large number of nodes in the remaining network. Deterministic key distribution schemes have the advantage that the graph is fully connected because every node in the network can establish a key with any other node. Deterministic schemes guarantee the establishment of a unique key between any pair of sensor nodes in the network. When nodes are captured, full network connectivity is still there. These are advantages over the probabilistic schemes. But deterministic schemes are less resilient to node capture; whole network is compromised after capturing a certain number of nodes (t) from the network. This is called t-collusion resistance. Polynomial-based key predistribution schemes [6, 7] also allow any pair of nodes in a network to be able to find a pairwise secret key. To improve the security of the polynomial based key distribution scheme, Liu and Ning [7] propose two schemes namely polynomial pool based key pre distribution and grid based key pre distribution. 
In this paper, we propose a novel scheme for key distribution based on polynomials over finite fields. The proposed scheme has advantages of both probabilistic and deterministic approaches. As it is based on polynomials, for a node, it guarantees the establishment of keys with every neighbor. After initial deployment, polynomial from each node is erased. This makes our scheme very much resilient to node capture. Erasing polynomial gives rise to problem of adding new nodes in the network. To resolve this issue, we proposed a method for adding new node explained in Section II. The paper is organized as: In the next section, we discuss our scheme. Section III provides analysis of our algorithm. Section IV contains simulation studies and comparison with existing schemes. Finally, we conclude in Section V. 
2. Our Approach 
2.1. Architecture, Assumptions and Notations 
We assume that the immediate neighboring nodes of any sensor node will not be known in advance. As wireless communication is not secure, we assume an adversary can eavesdrop on all the traffic, inject packets. The sensors nodes are randomly distributed and are not aware of the topology prior to the deployment. Sensor nodes remain stationary during the operation of the network. Being wireless and working unattended, often in a hostile environment renders sensor networks vulnerable to a number of attacks. Classical network attacks include eavesdropping, message interception, message reproduction and jamming. When nodes are captured, their memory can be read and erased or tampered with. Therefore, an adversary would know all the contents of a compromised node’s memory. However adversary may eavesdrop on the traffic. A general assumption [9] is that an adversary does not capture a sensor node for a certain period of time following the network’s initial deployment. So the network initialization takes place safely. There exists a lower bound on the time interval Tmin that is necessary for an adversary to compromise a sensor node, and time Test for a newly deployed sensor node to discover its immediate neighbors is smaller than Tmin. In practice, we expect Test to be of the order of several seconds, so it is a reasonable assumption that Tmin > Test. 
Notations: We use the following notation to describe our key distribution scheme and cryptographic operations in this report: 
– U and V are the communicating nodes. 
– IDU is the ID of a node U 
– KU,V is the secret key between nodes U and V used for communication between these two nodes. 
– N is the total number of nodes deployed initially 
– m is the average number of neighbors that a typical sensor node has. 
– R is the transmission range of a node 
– ENCKU,V (M)) is the message M encrypted with key shared between the nodes U and V. 
2.2. Algorithm for Initial deployment 
Initially every node is given a symmetric polynomial P(X,Y) calculated on a value specific to each node. When nodes are deployed in the field then every node will find neighbors and establish a key with each of them by exchanging its ID with their IDs and calculating a common key between them. Node ID can be assigned by some central server before deployment. After this when we are adding new nodes then algorithm explained in the next section will be used.
Initial Setup: Before deployment a symmetric polynomial is calculated off-line P(X, Y). Each node U is 
given this polynomial P(X, Y) evaluated on its node ID, that is, IDU and this would be P(IDU, Y ). After 
deployment each sensor node would find its neighbors and gets their IDs. If neighbors of a node U are V1, V2, 
V3, V4, …, Vn then calculated common keys will be like this: 
KU,V1 = P(IDU, IDV1 ) = KV1,U 
KU,V2 = P(IDU, IDV2 ) = KV2,U 
... 
KU,Vn = P(IDU, IDVn) = KVn,U 
Here, KVn,U is the value evaluated by node Vn. As soon as keys have been calculated each node will erase its 
polynomial and every node would have only keys and no other information. In case there is a need to 
establish a key between two nodes that don’t share a key, path key will be established using intermediate 
nodes. Fig. 1 and Fig. 2 present the algorithms describing how initial setup will take place and how pairwise 
keys will be established with the neighbors of a node respectively. 
Fig.1: Initial Setup for Network 
Establishing path key: When a node U send data to a node V that is not a neighbor, a key KU,V has to be 
established between them. The node U would choose a key and send to its neighbors which would again 
forward it to next neighbor and finally reaching to the node V. Every node on the path has a key shared with 
its neighbors so nobody can get the key KUV because it is encrypted with pairwise key between every link. 
Thus if path from U to V is V1, V2, V3, …, Vc then key KUV will reach like this: 
ENCKU,V1 (KUV ) → ENCKV1,V2 (KUV ) → ENCKV2,V3 (KUV ) → … → ENCKVc-1,Vc (KUV )→ ENCKVc,V (KUV ) 
One security threat is due to display of key KUV at every intermediate node. This can be handled by 
employing existing multipath path key establishment scheme. U will find k disjoint paths to V. Then U will 
send the key KUV to V through these disjoint paths breaking the key KUV into k pieces as 
KUV = r1 XOR r2 XOR … XOR rk. Each ri will go from different path and whole key is not displayed to any node 
at intermediate level. At V key KUV will be recalculated by XORing all the pieces like r1 XOR r2 XOR…XOR 
rk. This is done to improve the security of probabilistic key scheme. Now it is more secure with slight 
increase in communication overhead. 
Fig.2: Network Discovery for node U 
2.3. Adding new nodes
No information is stored in the nodes after initial deployment. This poses a difficulty of adding new 
nodes. So, for addition of new nodes, we devise a novel way of adding nodes to the network. We are taking a 
set S of polynomials: P1(X), P2(X), P3(X), …, Pk(X) with degrees t1, t2, t3, …, tk respectively. Before 
deployment, a polynomial from the pool S is chosen randomly. It is evaluated on the node ID and calculated 
value is given to the node. Algorithm for node addition is given in the figure. 
Fig. 3: Addition of a new node U 
When a new node U is added, it is given the whole set S of polynomials. For key establishment, every 
neighbor Vj sends a value α and its encrypted value ENCPi(IDVj )(α) encrypted with its secret key Pi(IDVj) = 
KSVj, where Pi(X) is the polynomial given to Vj initially. Node U will evaluate all the polynomials on the id 
IDVj of each neighbors Vj. U tries to decrypt ENCPi(IDVj )(α) with all the values or keys calculated. It finds 
one such key K'U,Vj which gives α on decryption of ENCPi(IDVj )(α). This is the common key between U and 
Vj by which new key would be sent. U randomly chooses a key KU,Vj , encrypts it with K'U,Vj and sends 
encrypted value ENCK'U,Vj(KU,Vj ) to Vj. U erases K'U,Vj once key KU,Vj is established between U and Vj . Node 
Vj decrypts ENCK'U,Vj(KU,Vj ) and gets KU,Vj . Now both U and Vj have the same key KU,Vj for further 
communication. Same process is repeated for each neighbors. After establishing keys with every neighbor, 
erase each polynomial. 
3. Analysis of the Algorithm 
We show below the complexity of evaluating a polynomial if nodes are captured. 
Lemma: Let degree of each polynomial in the set S is t. Complexity of calculating a polynomial from 
the set S is O((W+1)Ct+1 × (t + 1)3) where W is the sum of the degrees of all the polynomial in the set S . 
Proof: W will be equal to t × |S|. In order to find the polynomial of degree t an adversary has to capture at 
least W + 1 nodes. Because the adversary doesn’t have any information about the secret key, so she has to 
apply brute force method only and consider all the subsets of size t+1 from all the W +1 nodes. There are 
(W+1)Ct+1 such combinations possible. For each combination she can find a polynomial that fits to these values. 
The complexity of the procedure will be O((t + 1)3). After finding a particular polynomial then the adversay 
needs to verify with other nodes to check whether the resultant is the original polynomial or not. Thus 
complexity of finding a particular polynomial is equivalent to solving a set of linear equations (W+1)Ct+1 times. 
Thus the computational overhead for calculating a polynomial for a given set of values is shown in figure 4 
and 5.
Fig. 4 Fig. 5 
4. Simulation Studies and Comparison with Existing Schemes 
For simulation, we take an area of n × n square meters and N number of nodes is scattered uniformly in the area. Thus coordinates (x, y) will be in the range from (0,0) to (n,n). Each node has an average m number of neighbors which is calculated as: m = (n × n)/( π× R×R) where each node has transmission range of R meters. Each node will send the detected event to some remote location. So we need to deploy n-1 special nodes on the line y = n, starting from (R/2, n) to ((n-R)/2, n). We call these nodes as border nodes. These special nodes have more computational capacity and have more energy. Every node will send the messages to one of the border nodes to which message has to be sent and is decided on the least cost basis. Whichever node is closer to the sender, based on distance metric, is selected as the receiver and the message is sent to that node. We use Dijkstra algorithm for finding shortest path from sender to receiver. 
4.1. Comparison with Deterministic Scheme 
In the polynomial based key distribution scheme, it is easy to add a new node because every node has a polynomial share and that will be used to calculate the common key between two nodes. In our approach we solve the issue by giving every node U, a unique secret key KSu that is used during addition of a new node. Although polynomial pool based key distribution scheme is better than the basic polynomial based scheme but it has one major drawback of increased memory overhead. If every node is given a set S of polynomials then space used to store these polynomials will be s×(t+1)×logq where t is the degree of every polynomial. In our scheme, the space overhead is very less. Another advantage of our scheme has is that, it is very difficult to calculate a polynomial from the polynomial set P1(X), P2(X),…,P|S|(X). While in polynomial pool based scheme, if a sufficient number of nodes are captured it is very easy to calculate the polynomials. The third advantage of our scheme is the network survival. Even if adversary captures any number of nodes, our network will survive and any existing link will not be compromised. The fourth advantage is that in pool based scheme when number of compromised nodes increases then fraction of compromised links between non-compromised sensors also increases but in our scheme no affect is observed on the links between non- compromised nodes. In our algorithm there will be some computational overhead initially. If there are m neighbors then in polynomial pool based and basic polynomial scheme, computation overhead required to calculate the polynomial m times but in our algorithm this will be (|S|/2)×m. So we cannot keep the pool size |S| very large. Typical values for |S| and t are 8 and 50. For setting these values one requires 2230 computations to calculate a polynomial. Polynomial pool based scheme will not have any such calculation overhead once sufficient number of polynomials is captured. 8 polynomials of degree 50 will require a space of 8×50×64 bits i.e. 3200 bytes. However it will require 4 times computation overhead during initialization than previous schemes but it is comparable with the whole energy of a sensor node that will last for many days or months. 
4.2. Comparison with Probabilistic Key Distribution Schemes 
In the probabilistic key distribution, there is a trade-off between how many keys to be given to each node and what should be the size of the keypool. If number of keys given to a node is large then graph will be disconnected after a few node capture. If it is small then it will affect the connectivity of the network. In [1] it is shown that for a network of size 10,000 nodes for establishing a key with a node with probability 0.5 it
is required to have 75 keys in each node. Here on an average every node will have 40 neighbors. If key size is 64-bit then space overhead will be 600 bytes and still we are getting connectivity with probability 0.5. But actually it needs to store keys with neighbors that will require 320 bytes space only. This is the space that is exactly required in our scheme. Although our algorithm will not have too much energy advantage over the probabilistic key schemes, still in the initial run our scheme will have a good percentage of energy advantage. Energy comparison of our scheme and probabilistic key scheme is plotted in figures 6-9 for different settings of number of nodes N , number of neighbors m of each node, area of the network in which nodes are deployed. Each graph is plotted for the ratio of energy consumed in the random scheme to energy consumed in our scheme. It is clear that there is some energy advantage in our scheme shown in the figure. Energy is less consumed initially in our scheme due to taking a direct path from source to destination. But in probabilistic key scheme path taken may not be the shortest path taken due key sharing restriction. Third advantage is, if nodes are captured in a sufficient number then whole network gets disconnected in probabilistic schemes. In our algorithm network will not get disconnected even after capturing any number of nodes as long as there exists nodes in the path. Key compromises will not let our network disconnected that is the case in probabilistic key schemes. Number of messages sent, to establish a path, is less in our scheme. 
Fig.6: neighbor=30 Fig.7: neighbor=50 
Fig.8: area=500x500 Fig.9: neighbor=1000x1000 
5. Conclusion and Future work 
We proposed a key distribution scheme that has a very good resilience to node capture. Any number of node’s capture doesn’t affect even a single link in the remaining network. Also it has many other advantages over probabilistic key distribution scheme and deterministic key distribution scheme. Compared to deterministic scheme, it is more secure, requires less space for keying material, have full network connectivity even after compromising a great fraction of nodes in the network and doesn’t have compromised links between non-compromised nodes. With respect to probabilistic key distribution schemes,
our scheme provides full connectivity, consumes less energy and provides full network connectivity even after compromising any number of nodes from the network, requires less space and less number of messages to establish a key. Finally, very good resilience to node capture is the main advantage our scheme achieves. There is some scope to improve upon our algorithm. Developing a scheme, that provides better path key establishment while retaining good features of our algorithm, would be future work. 
6. References 
[1] L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In: 9th ACM conference on Computer and Communications Security, 2002. 
[2] H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In: IEEE Symposium on Research in Security and Privacy, 2003. 
[3] R. Blom, An optimal class of symmetric key generation systems. Eurocrypt, 1976. 
[4] Wenliang Du and Jing Deng and Yunghsiang S. Han and Pramod K. Varshney and Jonathan Katz and Aram Khalili, A pairwise key predistribution scheme for wireless sensor networks, ACM Trans. Inf. Syst. Secur., 8, 2, 2003, 228– 258, ACM, New York, NY, USA. 
[5] J. Lee and D. Stinson. Deterministic key pre-distribution schemes for distributed sensor networks, http://www.cacr.math.uwaterloo. ca/dstinson/ pubs.html, 2004. 
[6] C. Blundo, A. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly-secure key distribution for dynamic conferences. Crypto, 1992. 
[7] D. Liu and P. Ning. Establishing Pairwise Keys in Distributed Sensor Networks. In: 10th ACM Conference on Computer and Communications Security (CCS ’03), 2003. 
[8] D. Liu and P. Ning, Location-based pairwise key establishment for static sensor networks, In: 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003. 
[9] Adrian Perrig and Robert Szewczyk and Victor Wen and David E. Culler and J. D. Tygar, SPINS: security protocols for sensor netowrks. Mobile Computing and Networking, 189–199, 2001

More Related Content

PDF
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
ijceronline
 
PDF
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
IOSR Journals
 
PDF
Secure key exchange and encryption mechanism for group communication in wirel...
graphhoc
 
PDF
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
IJNSA Journal
 
PDF
Review on key predistribution schemes in wireless sensor networks
ijassn
 
PDF
International Journal of Computational Engineering Research (IJCER)
ijceronline
 
PDF
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
PDF
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
International Journal of Science and Research (IJSR)
 
Key Establishment using Selective Repeat Automatic Repeat Request Mechanism f...
ijceronline
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
IOSR Journals
 
Secure key exchange and encryption mechanism for group communication in wirel...
graphhoc
 
SYMMETRIC KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
IJNSA Journal
 
Review on key predistribution schemes in wireless sensor networks
ijassn
 
International Journal of Computational Engineering Research (IJCER)
ijceronline
 
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
International Journal of Science and Research (IJSR)
 

What's hot (19)

PDF
Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks
ijceronline
 
PDF
Info mimi-hop-by-hop authentication
Selva Raj
 
PDF
Info mimi-hop-by-hop authentication-copy
Selva Raj
 
PDF
Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSN
IJMTST Journal
 
PDF
A key management approach for wireless sensor networks
Zac Darcy
 
PDF
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
CSCJournals
 
PDF
Survey of the end to end secure communication in ADHOC networks
Ahmad Sharifi
 
PDF
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
IDES Editor
 
PDF
Ijnsa050213
IJNSA Journal
 
PDF
How to Counter-act Security Threats in Mobile Ad Hoc Networks?
drsrinivasanvenkataramani
 
PDF
Selective jamming attack prevention based on packet hiding methods and wormholes
IJNSA Journal
 
PDF
New Security Threats and Protection Techniques in Mobile Ad Hoc Networks
drsrinivasanvenkataramani
 
PDF
Detection of Various Attacks using Zero Knowledge Protocol in Wireless Security
ijceronline
 
PDF
A NEW KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORKS
IJNSA Journal
 
PDF
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
IJNSA Journal
 
PDF
Efficient security approaches in mobile ad hoc networks a survey
eSAT Publishing House
 
PDF
A Novel Key Distribution Scheme f or a Visual Crypto System
IRJET Journal
 
PDF
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Editor IJMTER
 
PDF
N0704075079
IJERD Editor
 
Random Key Pre-distribution Schemes using Multi-Path in Wireless Sensor Networks
ijceronline
 
Info mimi-hop-by-hop authentication
Selva Raj
 
Info mimi-hop-by-hop authentication-copy
Selva Raj
 
Secure & Energy Efficient Scheme against Denial-of-Sleep Attack in WSN
IJMTST Journal
 
A key management approach for wireless sensor networks
Zac Darcy
 
Malicious Node Detection Mechanism for Wireless Ad Hoc Network
CSCJournals
 
Survey of the end to end secure communication in ADHOC networks
Ahmad Sharifi
 
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
IDES Editor
 
Ijnsa050213
IJNSA Journal
 
How to Counter-act Security Threats in Mobile Ad Hoc Networks?
drsrinivasanvenkataramani
 
Selective jamming attack prevention based on packet hiding methods and wormholes
IJNSA Journal
 
New Security Threats and Protection Techniques in Mobile Ad Hoc Networks
drsrinivasanvenkataramani
 
Detection of Various Attacks using Zero Knowledge Protocol in Wireless Security
ijceronline
 
A NEW KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORKS
IJNSA Journal
 
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
IJNSA Journal
 
Efficient security approaches in mobile ad hoc networks a survey
eSAT Publishing House
 
A Novel Key Distribution Scheme f or a Visual Crypto System
IRJET Journal
 
Securing Many-To- Many Wireless Sensor Networks With Unique Dynamic Key
Editor IJMTER
 
N0704075079
IJERD Editor
 
Ad

Viewers also liked (9)

PDF
The Apache Way (And How Not to Break Builds!)
Radhika Puthiyetath
 
PPTX
Citrix Synergy 2014: Going the CloudPlatform Way
Iliyas Shirol
 
PDF
Mozcafe@bcrec1
Chandan Singh
 
PPTX
Hadoop Migration from 0.20.2 to 2.0
Jabir Ahmed
 
PPTX
Current it skills in demand
Vishvakannada Foundation
 
PPTX
Explicit Dedication of Resources in CloudStack
Saksham Srivastava
 
PPTX
Trouble shooting apachecloudstack
Sailaja Sunil
 
PPTX
Sunny bday
Vijay Das
 
PPTX
Dev cloud
Rajesh Battala
 
The Apache Way (And How Not to Break Builds!)
Radhika Puthiyetath
 
Citrix Synergy 2014: Going the CloudPlatform Way
Iliyas Shirol
 
Mozcafe@bcrec1
Chandan Singh
 
Hadoop Migration from 0.20.2 to 2.0
Jabir Ahmed
 
Current it skills in demand
Vishvakannada Foundation
 
Explicit Dedication of Resources in CloudStack
Saksham Srivastava
 
Trouble shooting apachecloudstack
Sailaja Sunil
 
Sunny bday
Vijay Das
 
Dev cloud
Rajesh Battala
 
Ad

Similar to An Efficient Key Distribution Scheme for Wireless Sensor Networks using polynomial based schemes (20)

PDF
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
IJERA Editor
 
PDF
Research on key predistribution scheme of wireless sensor networks
IAEME Publication
 
PDF
REVIEW ON KEY PREDISTRIBUTION SCHEMES IN WIRELESS SENSOR NETWORKS
ijassn
 
PDF
Significant Storage on Sensor Storage Space, Energy Consumption and Better Se...
ijasuc
 
PDF
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
ijasuc
 
PDF
Enhancing the Security in WSN using Three Tier Security Architecture
AM Publications,India
 
PDF
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
idescitation
 
PDF
A Key Management Approach For Wireless Sensor Networks
Zac Darcy
 
PDF
A Key Management Approach For Wireless Sensor Networks
Zac Darcy
 
PDF
A Key Management Approach For Wireless Sensor Networks
Zac Darcy
 
PDF
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ijwmn
 
PDF
An Analysis of Location Independent Key Predistribution Schemes for Wireless ...
IRJET Journal
 
PDF
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET Journal
 
PDF
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
IDES Editor
 
PDF
Network coding combined with onion routing for anonymous and secure communica...
IJCNCJournal
 
PDF
Ijcnc050210
IJCNCJournal
 
PDF
Secure and efficient key pre distribution schemes for wsn using combinatorial...
eSAT Publishing House
 
PDF
SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...
IJNSA Journal
 
PDF
Pairwise Keys Generation Using Prime Number Function in Wireless Sensor Networks
IDES Editor
 
PDF
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
IJMER
 
A Modified Pair Wise Key Distribution Schemes and There Effect On Network Per...
IJERA Editor
 
Research on key predistribution scheme of wireless sensor networks
IAEME Publication
 
REVIEW ON KEY PREDISTRIBUTION SCHEMES IN WIRELESS SENSOR NETWORKS
ijassn
 
Significant Storage on Sensor Storage Space, Energy Consumption and Better Se...
ijasuc
 
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
ijasuc
 
Enhancing the Security in WSN using Three Tier Security Architecture
AM Publications,India
 
Hierarchical Key Agreement Protocol for Wireless Sensor Networks
idescitation
 
A Key Management Approach For Wireless Sensor Networks
Zac Darcy
 
A Key Management Approach For Wireless Sensor Networks
Zac Darcy
 
A Key Management Approach For Wireless Sensor Networks
Zac Darcy
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ijwmn
 
An Analysis of Location Independent Key Predistribution Schemes for Wireless ...
IRJET Journal
 
IRJET- - Implementation of a Secured Approach using Dynamic Key Managemen...
IRJET Journal
 
A Traffic-Aware Key Management Architecture for Reducing Energy Consumption i...
IDES Editor
 
Network coding combined with onion routing for anonymous and secure communica...
IJCNCJournal
 
Ijcnc050210
IJCNCJournal
 
Secure and efficient key pre distribution schemes for wsn using combinatorial...
eSAT Publishing House
 
SECURITY ENHANCED KEY PREDISTRIBUTION SCHEME USING TRANSVERSAL DESIGNS AND RE...
IJNSA Journal
 
Pairwise Keys Generation Using Prime Number Function in Wireless Sensor Networks
IDES Editor
 
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
IJMER
 

Recently uploaded (20)

PPTX
Care of patients with elImination deviation.pptx
AneetaSharma15
 
PPTX
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
PPTX
How to Apply for a Job From Odoo 18 Website
Celine George
 
PPTX
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
PPTX
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
PPTX
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
PDF
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
PPTX
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
PDF
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
PPTX
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 
PPTX
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
PPTX
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
PPTX
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
DOCX
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
PPTX
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
PDF
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
PPTX
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
PPTX
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
PDF
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
DOCX
Action Plan_ARAL PROGRAM_ STAND ALONE SHS.docx
Levenmartlacuna1
 
Care of patients with elImination deviation.pptx
AneetaSharma15
 
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
How to Apply for a Job From Odoo 18 Website
Celine George
 
A Smarter Way to Think About Choosing a College
Cyndy McDonald
 
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
Sandeep Swamy
 
Measures_of_location_-_Averages_and__percentiles_by_DR SURYA K.pptx
Surya Ganesh
 
BÀI TẬP TEST BỔ TRỢ THEO TỪNG CHỦ ĐỀ CỦA TỪNG UNIT KÈM BÀI TẬP NGHE - TIẾNG A...
Nguyen Thanh Tu Collection
 
TEF & EA Bsc Nursing 5th sem.....BBBpptx
AneetaSharma15
 
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
Software Engineering BSC DS UNIT 1 .pptx
Dr. Pallawi Bulakh
 
Artificial-Intelligence-in-Drug-Discovery by R D Jawarkar.pptx
Rahul Jawarkar
 
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
How to Close Subscription in Odoo 18 - Odoo Slides
Celine George
 
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
Action Plan_ARAL PROGRAM_ STAND ALONE SHS.docx
Levenmartlacuna1
 

An Efficient Key Distribution Scheme for Wireless Sensor Networks using polynomial based schemes

  • 1. An Efficient Key Distribution Scheme for Wireless Sensor Networks using polynomial based schemes Sanjay Kumar 1, Deepti Dohare 2 and Mahesh Kumar 3 1 Benpour Technologies Pvt. Ltd, Dehradun, 2 Citrix Systems, Bangalore 3 ICFAI University, Dehradun Abstract. Sensor Networks are highly vulnerable to attacks because, it consists of various resource- constrained devices and they communicate via wireless links. Establishment of pairwise keys between sensor nodes is used to realize many of the security services for Sensor Networks. Hence securely distributing keys among sensor nodes is a fundamental challenge in providing security services. In literature, there are two types of key distribution schemes: probabilistic and deterministic. Probabilistic schemes provide good resilience but the effect of a node capture spreads throughout the network and hence connectivity is affected. While deterministic schemes guarantee the key establishment between any pair of nodes in a network, they are less resilient to node capture. In this paper, we proposed a key distribution scheme based on polynomials that provide full connectivity and very good resilience to node capture. It also has low communication overhead and very less space overhead. We have also proposed a novel method for the addition of new nodes in the network. Keywords: Key Distribution schemes, Sensor Networks, Polynomials 1. Introduction Sensor Networks have potential to provide economical solutions to many problems of practical importance. Some of the applications where Sensor Networks can be used are: Emergency Response System, Energy Management, Battlefield Management, Health Monitoring, Logistics and Inventory management etc. Sensor Networks are deployed in hostile environments. Environmental conditions along with resource- constraints give rise to many security threats or attacks. Adversary can physically capture and get the information contained in the sensor node, eavesdrop and inject new messages, modify messages, listen and analyse the messages to obtain the information contained in a message etc. Since solution to physical capture of a node is not possible, we can provide solutions to other security attacks. To defend against false data injection, authenticity of the sender must be checked so that sensors will not listen to unauthorized nodes. Modification of a message is detected by checking integrity of the message. To ensure confidentiality, the information contained in the message should not be displayed to any node other than sender and receiver. The message is sent encrypted with a key that is shared by sender and receiver. Keys play a central role in realizing security services like: authenticity, integrity, confidentiality etc. Keys need to be distributed securely among sensor nodes. For the distribution of keys, many key management schemes have been proposed in literature. Basically there are two types of approaches for distributing keys among sensor nodes viz. probabilistic approaches [1, 2] and deterministic approaches [3–8]. Eschenauer and Gligor [1] proposed a probabilistic key-predistribution scheme for pairwise key establishment. For each sensor node, a set of keys are chosen from a big pool of keys and given to each node before deployment. Chan et al. [2] further extended this idea and developed two key predistribution techniques: qcomposite key predistribution and random pairwise  Sanjay Kumar. Tel.: + 91 9412148830. E-mail address: [email protected]. ISBN 978-1-84626-xxx-x 2012 International Conference on Information and Network Technology (ICINT 2012) Chennai, India, 28-29 April, 2012, pp. xxx-xxx
  • 2. scheme[2]. Thus major drawback of probabilistic key distribution scheme is that, small number of compromised nodes affects a large number of nodes in the remaining network. Deterministic key distribution schemes have the advantage that the graph is fully connected because every node in the network can establish a key with any other node. Deterministic schemes guarantee the establishment of a unique key between any pair of sensor nodes in the network. When nodes are captured, full network connectivity is still there. These are advantages over the probabilistic schemes. But deterministic schemes are less resilient to node capture; whole network is compromised after capturing a certain number of nodes (t) from the network. This is called t-collusion resistance. Polynomial-based key predistribution schemes [6, 7] also allow any pair of nodes in a network to be able to find a pairwise secret key. To improve the security of the polynomial based key distribution scheme, Liu and Ning [7] propose two schemes namely polynomial pool based key pre distribution and grid based key pre distribution. In this paper, we propose a novel scheme for key distribution based on polynomials over finite fields. The proposed scheme has advantages of both probabilistic and deterministic approaches. As it is based on polynomials, for a node, it guarantees the establishment of keys with every neighbor. After initial deployment, polynomial from each node is erased. This makes our scheme very much resilient to node capture. Erasing polynomial gives rise to problem of adding new nodes in the network. To resolve this issue, we proposed a method for adding new node explained in Section II. The paper is organized as: In the next section, we discuss our scheme. Section III provides analysis of our algorithm. Section IV contains simulation studies and comparison with existing schemes. Finally, we conclude in Section V. 2. Our Approach 2.1. Architecture, Assumptions and Notations We assume that the immediate neighboring nodes of any sensor node will not be known in advance. As wireless communication is not secure, we assume an adversary can eavesdrop on all the traffic, inject packets. The sensors nodes are randomly distributed and are not aware of the topology prior to the deployment. Sensor nodes remain stationary during the operation of the network. Being wireless and working unattended, often in a hostile environment renders sensor networks vulnerable to a number of attacks. Classical network attacks include eavesdropping, message interception, message reproduction and jamming. When nodes are captured, their memory can be read and erased or tampered with. Therefore, an adversary would know all the contents of a compromised node’s memory. However adversary may eavesdrop on the traffic. A general assumption [9] is that an adversary does not capture a sensor node for a certain period of time following the network’s initial deployment. So the network initialization takes place safely. There exists a lower bound on the time interval Tmin that is necessary for an adversary to compromise a sensor node, and time Test for a newly deployed sensor node to discover its immediate neighbors is smaller than Tmin. In practice, we expect Test to be of the order of several seconds, so it is a reasonable assumption that Tmin > Test. Notations: We use the following notation to describe our key distribution scheme and cryptographic operations in this report: – U and V are the communicating nodes. – IDU is the ID of a node U – KU,V is the secret key between nodes U and V used for communication between these two nodes. – N is the total number of nodes deployed initially – m is the average number of neighbors that a typical sensor node has. – R is the transmission range of a node – ENCKU,V (M)) is the message M encrypted with key shared between the nodes U and V. 2.2. Algorithm for Initial deployment Initially every node is given a symmetric polynomial P(X,Y) calculated on a value specific to each node. When nodes are deployed in the field then every node will find neighbors and establish a key with each of them by exchanging its ID with their IDs and calculating a common key between them. Node ID can be assigned by some central server before deployment. After this when we are adding new nodes then algorithm explained in the next section will be used.
  • 3. Initial Setup: Before deployment a symmetric polynomial is calculated off-line P(X, Y). Each node U is given this polynomial P(X, Y) evaluated on its node ID, that is, IDU and this would be P(IDU, Y ). After deployment each sensor node would find its neighbors and gets their IDs. If neighbors of a node U are V1, V2, V3, V4, …, Vn then calculated common keys will be like this: KU,V1 = P(IDU, IDV1 ) = KV1,U KU,V2 = P(IDU, IDV2 ) = KV2,U ... KU,Vn = P(IDU, IDVn) = KVn,U Here, KVn,U is the value evaluated by node Vn. As soon as keys have been calculated each node will erase its polynomial and every node would have only keys and no other information. In case there is a need to establish a key between two nodes that don’t share a key, path key will be established using intermediate nodes. Fig. 1 and Fig. 2 present the algorithms describing how initial setup will take place and how pairwise keys will be established with the neighbors of a node respectively. Fig.1: Initial Setup for Network Establishing path key: When a node U send data to a node V that is not a neighbor, a key KU,V has to be established between them. The node U would choose a key and send to its neighbors which would again forward it to next neighbor and finally reaching to the node V. Every node on the path has a key shared with its neighbors so nobody can get the key KUV because it is encrypted with pairwise key between every link. Thus if path from U to V is V1, V2, V3, …, Vc then key KUV will reach like this: ENCKU,V1 (KUV ) → ENCKV1,V2 (KUV ) → ENCKV2,V3 (KUV ) → … → ENCKVc-1,Vc (KUV )→ ENCKVc,V (KUV ) One security threat is due to display of key KUV at every intermediate node. This can be handled by employing existing multipath path key establishment scheme. U will find k disjoint paths to V. Then U will send the key KUV to V through these disjoint paths breaking the key KUV into k pieces as KUV = r1 XOR r2 XOR … XOR rk. Each ri will go from different path and whole key is not displayed to any node at intermediate level. At V key KUV will be recalculated by XORing all the pieces like r1 XOR r2 XOR…XOR rk. This is done to improve the security of probabilistic key scheme. Now it is more secure with slight increase in communication overhead. Fig.2: Network Discovery for node U 2.3. Adding new nodes
  • 4. No information is stored in the nodes after initial deployment. This poses a difficulty of adding new nodes. So, for addition of new nodes, we devise a novel way of adding nodes to the network. We are taking a set S of polynomials: P1(X), P2(X), P3(X), …, Pk(X) with degrees t1, t2, t3, …, tk respectively. Before deployment, a polynomial from the pool S is chosen randomly. It is evaluated on the node ID and calculated value is given to the node. Algorithm for node addition is given in the figure. Fig. 3: Addition of a new node U When a new node U is added, it is given the whole set S of polynomials. For key establishment, every neighbor Vj sends a value α and its encrypted value ENCPi(IDVj )(α) encrypted with its secret key Pi(IDVj) = KSVj, where Pi(X) is the polynomial given to Vj initially. Node U will evaluate all the polynomials on the id IDVj of each neighbors Vj. U tries to decrypt ENCPi(IDVj )(α) with all the values or keys calculated. It finds one such key K'U,Vj which gives α on decryption of ENCPi(IDVj )(α). This is the common key between U and Vj by which new key would be sent. U randomly chooses a key KU,Vj , encrypts it with K'U,Vj and sends encrypted value ENCK'U,Vj(KU,Vj ) to Vj. U erases K'U,Vj once key KU,Vj is established between U and Vj . Node Vj decrypts ENCK'U,Vj(KU,Vj ) and gets KU,Vj . Now both U and Vj have the same key KU,Vj for further communication. Same process is repeated for each neighbors. After establishing keys with every neighbor, erase each polynomial. 3. Analysis of the Algorithm We show below the complexity of evaluating a polynomial if nodes are captured. Lemma: Let degree of each polynomial in the set S is t. Complexity of calculating a polynomial from the set S is O((W+1)Ct+1 × (t + 1)3) where W is the sum of the degrees of all the polynomial in the set S . Proof: W will be equal to t × |S|. In order to find the polynomial of degree t an adversary has to capture at least W + 1 nodes. Because the adversary doesn’t have any information about the secret key, so she has to apply brute force method only and consider all the subsets of size t+1 from all the W +1 nodes. There are (W+1)Ct+1 such combinations possible. For each combination she can find a polynomial that fits to these values. The complexity of the procedure will be O((t + 1)3). After finding a particular polynomial then the adversay needs to verify with other nodes to check whether the resultant is the original polynomial or not. Thus complexity of finding a particular polynomial is equivalent to solving a set of linear equations (W+1)Ct+1 times. Thus the computational overhead for calculating a polynomial for a given set of values is shown in figure 4 and 5.
  • 5. Fig. 4 Fig. 5 4. Simulation Studies and Comparison with Existing Schemes For simulation, we take an area of n × n square meters and N number of nodes is scattered uniformly in the area. Thus coordinates (x, y) will be in the range from (0,0) to (n,n). Each node has an average m number of neighbors which is calculated as: m = (n × n)/( π× R×R) where each node has transmission range of R meters. Each node will send the detected event to some remote location. So we need to deploy n-1 special nodes on the line y = n, starting from (R/2, n) to ((n-R)/2, n). We call these nodes as border nodes. These special nodes have more computational capacity and have more energy. Every node will send the messages to one of the border nodes to which message has to be sent and is decided on the least cost basis. Whichever node is closer to the sender, based on distance metric, is selected as the receiver and the message is sent to that node. We use Dijkstra algorithm for finding shortest path from sender to receiver. 4.1. Comparison with Deterministic Scheme In the polynomial based key distribution scheme, it is easy to add a new node because every node has a polynomial share and that will be used to calculate the common key between two nodes. In our approach we solve the issue by giving every node U, a unique secret key KSu that is used during addition of a new node. Although polynomial pool based key distribution scheme is better than the basic polynomial based scheme but it has one major drawback of increased memory overhead. If every node is given a set S of polynomials then space used to store these polynomials will be s×(t+1)×logq where t is the degree of every polynomial. In our scheme, the space overhead is very less. Another advantage of our scheme has is that, it is very difficult to calculate a polynomial from the polynomial set P1(X), P2(X),…,P|S|(X). While in polynomial pool based scheme, if a sufficient number of nodes are captured it is very easy to calculate the polynomials. The third advantage of our scheme is the network survival. Even if adversary captures any number of nodes, our network will survive and any existing link will not be compromised. The fourth advantage is that in pool based scheme when number of compromised nodes increases then fraction of compromised links between non-compromised sensors also increases but in our scheme no affect is observed on the links between non- compromised nodes. In our algorithm there will be some computational overhead initially. If there are m neighbors then in polynomial pool based and basic polynomial scheme, computation overhead required to calculate the polynomial m times but in our algorithm this will be (|S|/2)×m. So we cannot keep the pool size |S| very large. Typical values for |S| and t are 8 and 50. For setting these values one requires 2230 computations to calculate a polynomial. Polynomial pool based scheme will not have any such calculation overhead once sufficient number of polynomials is captured. 8 polynomials of degree 50 will require a space of 8×50×64 bits i.e. 3200 bytes. However it will require 4 times computation overhead during initialization than previous schemes but it is comparable with the whole energy of a sensor node that will last for many days or months. 4.2. Comparison with Probabilistic Key Distribution Schemes In the probabilistic key distribution, there is a trade-off between how many keys to be given to each node and what should be the size of the keypool. If number of keys given to a node is large then graph will be disconnected after a few node capture. If it is small then it will affect the connectivity of the network. In [1] it is shown that for a network of size 10,000 nodes for establishing a key with a node with probability 0.5 it
  • 6. is required to have 75 keys in each node. Here on an average every node will have 40 neighbors. If key size is 64-bit then space overhead will be 600 bytes and still we are getting connectivity with probability 0.5. But actually it needs to store keys with neighbors that will require 320 bytes space only. This is the space that is exactly required in our scheme. Although our algorithm will not have too much energy advantage over the probabilistic key schemes, still in the initial run our scheme will have a good percentage of energy advantage. Energy comparison of our scheme and probabilistic key scheme is plotted in figures 6-9 for different settings of number of nodes N , number of neighbors m of each node, area of the network in which nodes are deployed. Each graph is plotted for the ratio of energy consumed in the random scheme to energy consumed in our scheme. It is clear that there is some energy advantage in our scheme shown in the figure. Energy is less consumed initially in our scheme due to taking a direct path from source to destination. But in probabilistic key scheme path taken may not be the shortest path taken due key sharing restriction. Third advantage is, if nodes are captured in a sufficient number then whole network gets disconnected in probabilistic schemes. In our algorithm network will not get disconnected even after capturing any number of nodes as long as there exists nodes in the path. Key compromises will not let our network disconnected that is the case in probabilistic key schemes. Number of messages sent, to establish a path, is less in our scheme. Fig.6: neighbor=30 Fig.7: neighbor=50 Fig.8: area=500x500 Fig.9: neighbor=1000x1000 5. Conclusion and Future work We proposed a key distribution scheme that has a very good resilience to node capture. Any number of node’s capture doesn’t affect even a single link in the remaining network. Also it has many other advantages over probabilistic key distribution scheme and deterministic key distribution scheme. Compared to deterministic scheme, it is more secure, requires less space for keying material, have full network connectivity even after compromising a great fraction of nodes in the network and doesn’t have compromised links between non-compromised nodes. With respect to probabilistic key distribution schemes,
  • 7. our scheme provides full connectivity, consumes less energy and provides full network connectivity even after compromising any number of nodes from the network, requires less space and less number of messages to establish a key. Finally, very good resilience to node capture is the main advantage our scheme achieves. There is some scope to improve upon our algorithm. Developing a scheme, that provides better path key establishment while retaining good features of our algorithm, would be future work. 6. References [1] L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In: 9th ACM conference on Computer and Communications Security, 2002. [2] H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In: IEEE Symposium on Research in Security and Privacy, 2003. [3] R. Blom, An optimal class of symmetric key generation systems. Eurocrypt, 1976. [4] Wenliang Du and Jing Deng and Yunghsiang S. Han and Pramod K. Varshney and Jonathan Katz and Aram Khalili, A pairwise key predistribution scheme for wireless sensor networks, ACM Trans. Inf. Syst. Secur., 8, 2, 2003, 228– 258, ACM, New York, NY, USA. [5] J. Lee and D. Stinson. Deterministic key pre-distribution schemes for distributed sensor networks, http://www.cacr.math.uwaterloo. ca/dstinson/ pubs.html, 2004. [6] C. Blundo, A. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly-secure key distribution for dynamic conferences. Crypto, 1992. [7] D. Liu and P. Ning. Establishing Pairwise Keys in Distributed Sensor Networks. In: 10th ACM Conference on Computer and Communications Security (CCS ’03), 2003. [8] D. Liu and P. Ning, Location-based pairwise key establishment for static sensor networks, In: 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003. [9] Adrian Perrig and Robert Szewczyk and Victor Wen and David E. Culler and J. D. Tygar, SPINS: security protocols for sensor netowrks. Mobile Computing and Networking, 189–199, 2001