TY - JOUR
T1 - Key infection, secrecy transfer, and key evolution for sensor networks
AU - Liu, Zhihong
AU - Ma, Jianfeng
AU - Pei, Qingqi
AU - Pang, Liaojun
AU - Park, Youngho
PY - 2010/8
Y1 - 2010/8
N2 - Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys are required to be established between them. Considering the strict resource constraints of sensors, key infection has been proposed by Anderson, Chan, and Perrig. However, because the communication keys are broadcasted in plaintext in key infection, some of them may be eavesdropped by an adversary. To address this security issue, secrecy transfer is presented, which utilizes pre-loaded secret keying material to enhance the security performance of key infection. To thwart on-going cryptanalytic attacks, a key evolution scheme is proposed to continuously refresh shared keys. Key evolution forces the adversary to keep monitoring traffic all the time after compromising a key; even if the adversary has compromised a key, it cannot catch up with the key evolution process, and may lose control of the compromised key quickly in a noisy communication environment. Analysis results show that key infection, secrecy transfer, and key evolution present viable trade-offs between security and resource consumption for smart dust sensor networks.
AB - Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys are required to be established between them. Considering the strict resource constraints of sensors, key infection has been proposed by Anderson, Chan, and Perrig. However, because the communication keys are broadcasted in plaintext in key infection, some of them may be eavesdropped by an adversary. To address this security issue, secrecy transfer is presented, which utilizes pre-loaded secret keying material to enhance the security performance of key infection. To thwart on-going cryptanalytic attacks, a key evolution scheme is proposed to continuously refresh shared keys. Key evolution forces the adversary to keep monitoring traffic all the time after compromising a key; even if the adversary has compromised a key, it cannot catch up with the key evolution process, and may lose control of the compromised key quickly in a noisy communication environment. Analysis results show that key infection, secrecy transfer, and key evolution present viable trade-offs between security and resource consumption for smart dust sensor networks.
KW - Key evolution
KW - key infection
KW - secrecy transfer
KW - sensor network
UR - https://www.scopus.com/pages/publications/77955692643
U2 - 10.1109/TWC.2010.061410.100084
DO - 10.1109/TWC.2010.061410.100084
M3 - Article
AN - SCOPUS:77955692643
SN - 1536-1276
VL - 9
SP - 2643
EP - 2653
JO - IEEE Transactions on Wireless Communications
JF - IEEE Transactions on Wireless Communications
IS - 8
M1 - 5494770
ER -