An optimal class of symmetric key generation systems
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Directed diffusion: a scalable and robust communication paradigm for sensor networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Habitat monitoring: application driver for wireless communications technology
SIGCOMM LA '01 Workshop on Data communication in Latin America and the Caribbean
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
GHT: a geographic hash table for data-centric storage
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Resilient Data-Centric Storage in Wireless Ad-Hoc Sensor Networks
MDM '03 Proceedings of the 4th International Conference on Mobile Data Management
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
A pairwise key pre-distribution scheme for wireless sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Data Dissemination with Ring-Based Index for Wireless Sensor Networks
ICNP '03 Proceedings of the 11th IEEE International Conference on Network Protocols
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach
ICNP '03 Proceedings of the 11th IEEE International Conference on Network Protocols
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Power conservation and quality of surveillance in target tracking sensor networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Location-aware key management scheme for wireless sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Hi-index | 0.00 |
Letting two communicating parties share a key is an effective approach to achieve confidentiality and authenticity for their communications. If the parties know each other's id or are within each other's communication range, such a key can be set up using existing pairwise key establishment schemes. However, in sensor networks, there exist some communication patterns in which the sender only knows some attribute such as the rough location of its desired receiver, and the sender and receivers could be far apart. Directly extending the existing schemes to establish a pairwise key for such communicating parties is not efficient due to various reasons. To address the problem, we propose in this paper a new scheme that enables the two parties to securely communicate as long as they know each other's rough location. In this scheme, any two groups of nodes can set up a group-to-group (G2G) pairwise key based on their rough locations. Then the G2G key can be used to protect the communications between any two nodes in these groups. Extensive analysis and simulations are conducted to evaluate our approach. The results show that, by choosing the system parameters appropriately, a desired security level can be achieved without incurring high overhead.