Predistribution and local collaboration-based group rekeying for wireless sensor networks

  • Authors:
  • Wensheng Zhang;Sencun Zhu;Guohong Cao

  • Affiliations:
  • Department of Computer Science, Iowa State University, 226 Atanasoff Hall, Ames, IA 50011, United States;Department of Computer Science and Engineering, The Pennsylvania State University, University Park, PA 100084, United States;Department of Computer Science and Engineering, The Pennsylvania State University, University Park, PA 100084, United States

  • Venue:
  • Ad Hoc Networks
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

When a sensor network is deployed in a hostile environment, an adversary may launch such attacks as eavesdropping the communications and compromising sensor nodes. Using the compromised nodes, he may inject false sensing reports or modify the reports sent by other nodes. To defend against these attacks, researchers have proposed symmetric group key-based schemes. In these schemes, however, if a large number of nodes are compromised, many (sub)group keys will be revealed. This greatly endangers the filtering schemes, making them very ineffective or even useless. To address this problem, we propose a family of predistribution and local collaboration-based group rekeying (PCGR) schemes, which update the compromised group keys to prevent the compromised nodes from understanding the communications between noncompromised nodes or injecting false data. These schemes are designed based on a simple while controversial idea - preload future group keys into sensor nodes before their deployment. To protect the preloaded keys from being disclosed by compromised nodes, we propose a novel technique that requires neighboring nodes to collaborate to derive the future group keys. To the best of our knowledge, our schemes are the first set of distributed group rekeying schemes for sensor networks without involving online key servers. Extensive analysis and simulations are conducted to evaluate the proposed schemes, and the results show that the proposed schemes can achieve a good level of security, outperform several previous group rekeying schemes, and significantly improve the effectiveness of false data filtering.