12,000

We have over 12,000 students, from over 100 countries, within one of the safest campuses in the UK

93%

93% of Lancaster students go into work or further study within six months of graduating

Home > Research > Publications & Outputs > DHB-KEY: An Efficient Key Distribution Scheme f...
View graph of relations

« Back

DHB-KEY: An Efficient Key Distribution Scheme for Wireless Sensor Networks

Research output: Contribution in Book/Report/ProceedingsPaper

Published

Publication date29/09/2008
Host publicationMASS 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2008.
PublisherIEEE
Pages840-846
Number of pages7
ISBN (Print)978-1-4244-2574-7
Original languageEnglish

Conference

Conference5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS 2008)
Period9/01/0828/01/08

Conference

Conference5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS 2008)
Period9/01/0828/01/08

Abstract

Real-world deployments of wireless sensor networks require secure communication. In many application cases it is sufficient to provide message authentication at the sink. To implement this requirement using symmetric ciphers, keys shared between each sensor node and the sink have to be established and kept fresh during network operation. This paper presents a key distribution scheme based on the well known Elliptic Curve Diffie-Hellman key exchange mechanism that allows us to fulfil the previously outlined requirements efficiently. The DHB-KEY scheme requires only the distribution of a single sink-initiated broadcast message to set individual keys on all sensor nodes. Thus, DHB-KEY has a low complexity and preserves scarce resources such as bandwidth and energy. In the paper we present a protocol specification based on the DHB-KEY scheme and its implementation for the well known TinyOS platform. A physical intrusion detection system in an office building is used to evaluate the protocol implementation. The evaluation shows that DHB-KEY is practical in real-world deployments.