Title: Adaptive Random Key Distribution Schemes for Wireless Sensor Networks
1Adaptive Random Key Distribution Schemes for
Wireless Sensor Networks
- Shih-I Huang
- Dept. of Comp. Sci. Info. Eng.
- National Chiao Tung University
- WADIS03
2Outline
- Introduction
- Motivation
- Related Work
- Proposed Schemes
- Analysis
- Conclusion
3Introduction
- Wireless Sensor Networks (WSNs)
- It consists of a set of small devices with
sensing and wireless communication capabilities - Those small devices are named sensor nodes, and
are deployed within a special area to monitor a
physical phenomenon. - Ex Anthrax
- Multifunctional
- Depends on what sensors are attached
- Features
- Widely deployed. (1001M?)
- Low communication bandwidth
- Limited memory space and computation power
4Motivation
- A large WSN consists of thousands of nodes
- Need shared communication keys to ensure secure
peer-to-peer wireless communication - Limited memory storage (512 bytes 4K)
- To deliver data without being compromised, WSN
services rely on secure communication and key
distribution
5Conventional Scheme (Random Pair-wise)
K5
K2 K3 K4 K5 K6 K7
K1 K2 K3 K4 K6 K7
K1
K1 K2 K3 K5 K6 K7
K2
K4
K1 K3 K4 K5 K6 K7
K1 K2 K3 K4 K5 K6
K7
K3
K6
K1 K2 K4 K5 K6 K7
K1 K2 K3 K4 K5 K7
Requires a large storage space for keys in a
large WSN
6Motivation
- The existing key distribution solutions require a
large memory space in a large WSN - We propose two symmetric key distribution schemes
to minimize storage requirement - Adaptive Random Pre-distributed scheme (ARP)
- Unique Assigned One-way Hash Function scheme
(UAO)
7Related Work
8Random Graph Theory
- A Random Graph G(n, p) is a graph of n nodes, and
the probability that a link exists between any
two nodes is p. - Given a desired probability Pc for the graph
connectivity - ex Pc0.99999 to get a connected graph.
- Then we can get a threshold of p to form a
connected graph. - . (1)
- The expected degree of a node
-
.(2)
The scheme only needs to select d keys to keep
a network connected under probability p
9Random Key Based Schemes
- Basic Scheme
- L. Eschenauer, V. D. Gligor, A Key-Management
Scheme for Distributed Sensor Networks, 9th ACM
Conference on Computer and Communication
Security, pp.41-47, November 2002. (CCS02) - Each node randomly picks r keys from a unordered
key pool S. - Use the common shared key to establish a secure
link. - Relies on probabilistic key sharing among the
nodes of a random graph.
B
B
B
A
A
A
C
C
C
D
D
D
Secure link
Map Random Graph Theory to key selecting
problem
10Adaptive Random Pre-distributed Scheme (ARP
Scheme)
- The features of ARP scheme
- A Random Key based key distribution scheme for
WSNs. - To minimize the memory requirement.
- ARP scheme consists of
- Two-Dimension Key Pool
- Key Selecting Algorithm
11Two-Dimension Key Pool
- Use t one-way function F1, F2,,Ft and t seed
keys K1,0, K2,0,,Kt,0 to generate t one-way key
chains. - For a key chain KCi, it consists of Ki,0,
Ki,1,Ki,s-1. - Where Ki,j Fi(Ki,j-1), and the length of KCi is
s. - The key pool size s t.
12Key Selecting
- Each node randomly choose a one-way key chain,
and memorized its one-way function Fi and its
seed key Ki,0. - Randomly select d-t key chains KCt1,
KCt2,,KCt(d-t), from the rest of key chains. - For each key chain KCtj selected, randomly pick a
key Ktj,sj from KCtj and memorized Ktj,sj.
13Unique Assigned One-way Hash Function Scheme (UAO
Scheme)
- The features of UAO scheme
- Provide node-to-node authentication.
- Great resistance to node capture.
- The maximum supported network size is greater
than the existing schemes. - The UAO scheme consists of
- Key Decision Algorithm
- Node-to-Node Authentication Protocol
14Key Decision Algorithm
- Suppose each sensor node SNi has a unique
identity IDi. - First, we assign a unique one-way hash function
Fi to each sensor node SNi. - Second, SNi randomly selects d other sensor
nodes. - Third, each selected node use following formula
to generate the unique key for SNi. - Finally, SNi memorizes those unique keys and the
generating identities.
IDi
Fi
15Node-to-node Authentication Protocol
1
2
3
4
- SNi broadcasts its identity
- SNj verifies its key ring, if IDi is combined
with any key then - SNi calculates the Ks Fi(IDj), and decrypts the
message, then sends the ACK and challenge
message. - SNj receives the challenge and sends the response
16Analysis of ARP Scheme
- We analyze the ARP scheme in following aspect
- Probability of connectivity.
- Analyze the link probability of using
Two-Dimension Key Pool. - The link probability is equal to 1 Prany two
nodes do not share any key
17Probability of Connectivity (1/2)
- To calculate the probability that any two nodes A
and B do not share any common key - As one-way key chain does not match with Bs
one-way key chain. - As one-way key chain does not match with any Bs
selected keys. - The probability of above two parts is equal to
- As selected keys do not match with Bs one-way
key chain. - The probability is equal to
- As selected keys do not match with any Bs
selected keys. - The probability is equal to
- The link probability is equal to
-
(3)
18Probability of Connectivity (2/2)
Key pool size 100,000
ARP needs fewer keys to achieve the same
connectivity probability
19Analysis of UAO Scheme
- The link probability p can be evaluate by 1
Pr.two nodes do not have any key derived from
the others one-way function - p is equal to
- Substitute p by a function of d
- Substitute d by a function of n
- Evaluate the root of the above equation
r Key ring size
20Evaluation of UAO Scheme
Key size 128 bits Pc0.99999
21Conclusion
- Key distribution is a critical and fundamental
issue for the security service in WSNs. - The pre-distributed and symmetric cryptosystem
based scheme is well suitable for the resource
constrained sensor networks. - We propose two schemes based on one-way function
and Random Graph theory to provide memory
efficient key distribution for WSNs. - ARP scheme
- Provide efficient trade-off between memory space
and security strength. - UAO scheme
- Provide node-to-node authentication.
- Great resistant to node capture.
- If there is enough memory space, we suggest using
UAO scheme as the key distribution scheme for
WSNs. - Otherwise, we suggest using ARP scheme.
- To achieve an efficient trade-off between memory
space and security strength.