Conference Paper

Computationally and Resource Efficient Group Key Agreement for Ad Hoc Sensor Networks

Airtight Networks, Pune
DOI: 10.1109/COMSWA.2007.382601 Conference: Communication Systems Software and Middleware, 2007. COMSWARE 2007. 2nd International Conference on
Source: IEEE Xplore

ABSTRACT

Secure and reliable group communication is an important aspect of security in distributed ad hoc sensor networks. Most sensors are built to be inexpensive, low power devices and consequently have limited computational and communication resources. Constraints in resources make most conventional security protocols, such as Diffie-Hellman key exchange impractical. This work adapts existing work on tree-based group key agreement that combines key trees with Diffie-Hellman key exchange, by replacing expensive public key operations with relatively cheaper symmetric key operations. The modular exponentiations in Zn* used in Diffle-Hellman key exchange are replaced by polynomial evaluations in GF(2m) Galois fields, thereby reducing the code space and time complexity requirements for the protocols substantially. This makes the protocol adaptable for use on resource-constrained sensor networks. We also focus on secure and efficient group key management in the case of group mutation. Our group key management scheme will set up a per-session shared secret key among the group members when new members join or existing members leave the group. We also discuss a performance analysis of our scheme wherein we show that our protocol is efficient in terms of computational and memory requirements.

0 Followers
 · 
8 Reads
  • Source

    Preview · Article ·
  • [Show abstract] [Hide abstract]
    ABSTRACT: A critical security threat in a WSN is the compromising of sensor nodes. Not only can attackers use such vulnerability to eavesdrop on the dataflow, but could also inject bogus information into the network. However, most current secure data collection methods trade fault-tolerant ability for end-to-end protection, thus with poor performance. This work proposes CRINet, a secure and fault-tolerant data collection scheme with group key management mechanism. To achieve high reliability, sensing data would be transferred to the sink through multi-path. EBS is applied in CRINet for group key management in order to reduce re-key efforts. Simulation results demonstrate that CRINet scheme is superior in terms of data confidentiality and availability.
    No preview · Conference Paper · May 2009
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: This paper describes the design and implementation of a two-stage intrusion detection system (IDS) for use with mobile ad-hoc networks. Our anomaly-based intrusion detection is provided by analyzing the context from the application-level interactions of networked nodes; each interaction corresponds to a specific function or behavior within the operational scenario of the network. A static set of behaviors is determined offline, and these behaviors are tracked dynamically during the operation of the network. During the first stage of the IDS, our detection strategy employs the analysis of global and local maxima in the probability density functions of the behaviors to isolate deviance at the granularity of a single node. This stage is used to capture the typical behavior of the network. The first stage also provides tuning and calibration for the second stage. During the second stage, a cross-correlative component is used to detect multiple threats simultaneously. Our approach distributes the IDS among all connected network nodes, allowing each node to identify potential threats individually. The combined result can detect deviant nodes in a scalable manner and can operate in the presence of a density of deviant nodes approaching 22%. Computational requirements are reduced to adapt optimally to embedded devices on an ad-hoc network.
    Preview · Article · May 2010 · Ad Hoc Networks
Show more