TY - GEN
T1 - A time-based key management protocol for wireless sensor networks
AU - Jang, Jiyong
AU - Kwon, Taekyoung
AU - Song, Jooseok
PY - 2007
Y1 - 2007
N2 - It is not easy to achieve secure key establishment in wireless sensor networks without public key cryptography. Many key management protocols have been proposed for the purpose. Among them, LEAP is a simple and elegant protocol that establishes multi-level keys in an efficient way, but its security mainly relies on that of a single initialization key. Though it is assumed that the initial deployment phase is secure and the key is erased from sensor nodes after the initialization in LEAP, the assumption could not be viable for two reasons. First, the same key should be used again for node addition after the initialization phase whereas the new node can be captured before removing the key. Second, the initial deployment of dense networks may not take short as LEAP expected in many cases. This paper rethinks the security of LEAP and proposes a more secure scheme with a new notion of probabilistic time intervals. Rather we localize the impact of key compromise within the time intervals.
AB - It is not easy to achieve secure key establishment in wireless sensor networks without public key cryptography. Many key management protocols have been proposed for the purpose. Among them, LEAP is a simple and elegant protocol that establishes multi-level keys in an efficient way, but its security mainly relies on that of a single initialization key. Though it is assumed that the initial deployment phase is secure and the key is erased from sensor nodes after the initialization in LEAP, the assumption could not be viable for two reasons. First, the same key should be used again for node addition after the initialization phase whereas the new node can be captured before removing the key. Second, the initial deployment of dense networks may not take short as LEAP expected in many cases. This paper rethinks the security of LEAP and proposes a more secure scheme with a new notion of probabilistic time intervals. Rather we localize the impact of key compromise within the time intervals.
UR - http://www.scopus.com/inward/record.url?scp=37149017489&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=37149017489&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-72163-5_24
DO - 10.1007/978-3-540-72163-5_24
M3 - Conference contribution
AN - SCOPUS:37149017489
SN - 3540721592
SN - 9783540721598
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 314
EP - 328
BT - Information Security Practice and Experience - Third International Conference, ISPEC 2007, Proceedings
PB - Springer Verlag
T2 - 3rd International Conference on Information Security Practice and Experience, ISPEC 2007
Y2 - 7 May 2007 through 9 May 2007
ER -