Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks

Jaewoo Choi, Jihyun Bang, Leehyung Kim, Mirim Ahn, Taekyoung Kwon

Research output: Contribution to journalArticle

11 Citations (Scopus)

Abstract

To achieve secure communications in wireless sensor networks (WSNs), sensor nodes (SNs) must establish secret shared keys with neighboring nodes. Moreover, those keys must be updated by defeating the insider threats of corrupted nodes. In this paper, we propose a location-based key management scheme for WSNs, with special considerations of insider threats. After reviewing existing location-based key management schemes and studying their advantages and disadvantages, we selected location-dependent key management (LDK) as a suitable scheme for our study. To solve a communication interference problem in LDK and similar methods, we have devised a new key revision process that incorporates grid-based location information. We also propose a key establishment process using grid information. Furthermore, we construct key update and revocation processes to effectively resist inside attackers. For analysis, we conducted a rigorous simulation and confirmed that our method can increase connectivity while decreasing the compromise ratio when the minimum number of common keys required for key establishment is high. When there was a corrupted node leveraging insider threats, it was also possible to effectively rekey every SN except for the corrupted node using our method. Finally, the hexagonal deployment of anchor nodes could reduce network costs.

Original languageEnglish
Pages (from-to)494-502
Number of pages9
JournalIEEE Systems Journal
Volume11
Issue number2
DOIs
Publication statusPublished - 2017 Jun 1

Fingerprint

Wireless sensor networks
Sensor nodes
Anchors
Communication
Costs

All Science Journal Classification (ASJC) codes

  • Control and Systems Engineering
  • Electrical and Electronic Engineering

Cite this

Choi, Jaewoo ; Bang, Jihyun ; Kim, Leehyung ; Ahn, Mirim ; Kwon, Taekyoung. / Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks. In: IEEE Systems Journal. 2017 ; Vol. 11, No. 2. pp. 494-502.
@article{e5385b57bf554763b575367ef92f0f37,
title = "Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks",
abstract = "To achieve secure communications in wireless sensor networks (WSNs), sensor nodes (SNs) must establish secret shared keys with neighboring nodes. Moreover, those keys must be updated by defeating the insider threats of corrupted nodes. In this paper, we propose a location-based key management scheme for WSNs, with special considerations of insider threats. After reviewing existing location-based key management schemes and studying their advantages and disadvantages, we selected location-dependent key management (LDK) as a suitable scheme for our study. To solve a communication interference problem in LDK and similar methods, we have devised a new key revision process that incorporates grid-based location information. We also propose a key establishment process using grid information. Furthermore, we construct key update and revocation processes to effectively resist inside attackers. For analysis, we conducted a rigorous simulation and confirmed that our method can increase connectivity while decreasing the compromise ratio when the minimum number of common keys required for key establishment is high. When there was a corrupted node leveraging insider threats, it was also possible to effectively rekey every SN except for the corrupted node using our method. Finally, the hexagonal deployment of anchor nodes could reduce network costs.",
author = "Jaewoo Choi and Jihyun Bang and Leehyung Kim and Mirim Ahn and Taekyoung Kwon",
year = "2017",
month = "6",
day = "1",
doi = "10.1109/JSYST.2015.2422736",
language = "English",
volume = "11",
pages = "494--502",
journal = "IEEE Systems Journal",
issn = "1932-8184",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "2",

}

Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks. / Choi, Jaewoo; Bang, Jihyun; Kim, Leehyung; Ahn, Mirim; Kwon, Taekyoung.

In: IEEE Systems Journal, Vol. 11, No. 2, 01.06.2017, p. 494-502.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Location-Based Key Management Strong Against Insider Threats in Wireless Sensor Networks

AU - Choi, Jaewoo

AU - Bang, Jihyun

AU - Kim, Leehyung

AU - Ahn, Mirim

AU - Kwon, Taekyoung

PY - 2017/6/1

Y1 - 2017/6/1

N2 - To achieve secure communications in wireless sensor networks (WSNs), sensor nodes (SNs) must establish secret shared keys with neighboring nodes. Moreover, those keys must be updated by defeating the insider threats of corrupted nodes. In this paper, we propose a location-based key management scheme for WSNs, with special considerations of insider threats. After reviewing existing location-based key management schemes and studying their advantages and disadvantages, we selected location-dependent key management (LDK) as a suitable scheme for our study. To solve a communication interference problem in LDK and similar methods, we have devised a new key revision process that incorporates grid-based location information. We also propose a key establishment process using grid information. Furthermore, we construct key update and revocation processes to effectively resist inside attackers. For analysis, we conducted a rigorous simulation and confirmed that our method can increase connectivity while decreasing the compromise ratio when the minimum number of common keys required for key establishment is high. When there was a corrupted node leveraging insider threats, it was also possible to effectively rekey every SN except for the corrupted node using our method. Finally, the hexagonal deployment of anchor nodes could reduce network costs.

AB - To achieve secure communications in wireless sensor networks (WSNs), sensor nodes (SNs) must establish secret shared keys with neighboring nodes. Moreover, those keys must be updated by defeating the insider threats of corrupted nodes. In this paper, we propose a location-based key management scheme for WSNs, with special considerations of insider threats. After reviewing existing location-based key management schemes and studying their advantages and disadvantages, we selected location-dependent key management (LDK) as a suitable scheme for our study. To solve a communication interference problem in LDK and similar methods, we have devised a new key revision process that incorporates grid-based location information. We also propose a key establishment process using grid information. Furthermore, we construct key update and revocation processes to effectively resist inside attackers. For analysis, we conducted a rigorous simulation and confirmed that our method can increase connectivity while decreasing the compromise ratio when the minimum number of common keys required for key establishment is high. When there was a corrupted node leveraging insider threats, it was also possible to effectively rekey every SN except for the corrupted node using our method. Finally, the hexagonal deployment of anchor nodes could reduce network costs.

UR - http://www.scopus.com/inward/record.url?scp=85027404091&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85027404091&partnerID=8YFLogxK

U2 - 10.1109/JSYST.2015.2422736

DO - 10.1109/JSYST.2015.2422736

M3 - Article

VL - 11

SP - 494

EP - 502

JO - IEEE Systems Journal

JF - IEEE Systems Journal

SN - 1932-8184

IS - 2

ER -