[go: up one dir, main page]

Skip to main content

Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios

  • Conference paper
Critical Information Infrastructures Security (CRITIS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4347))

Abstract

It is commonly agreed that Wireless Sensor Networks (WSN) is one of the technologies that better fulfills features like the ones required by Critical (Information) Infrastructures. However, a sensor network is highly vulnerable against any external or internal attacks, thus network designers must know which are the tools that they can use in order to avoid such problems. In this paper we describe in detail a procedure (the KMS Guidelines), developed under our CRISIS project, that allows network designers to choose a certain Key Management System, or at least to know which protocol need to improve in order to satisfy the network requirements.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Commission of the European Communities. Communication from the Commission to the Council and the European Parliament: Critical Infrastructure Protection in the Fight Against Terrorism, COM (2004) 702 final, Brussels, October 20 (2004)

    Google Scholar 

  2. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Computer Networks: The International Journal of Computer and Telecommunications Networking 38(4), 393–422 (2002)

    Google Scholar 

  3. 2004 US National Plan for Research and Development in Support for CIP, April 8 (2005), retrieved from: http://www.dhs.gov/interweb/assetlibrary/ST_2004_NCIP_RD_PlanFINALApr05.pdf

  4. Bopping, D.: CIIP in Australia. In: 1st CI2RCO Critical Information Infrastructure Protection conference, Rome (March 2006)

    Google Scholar 

  5. Crossbow Technology, Inc. Wireless Measurement Systems, http://www.xbow.com

  6. Lopez, J., Montenegro, J.A., Roman, R.: Service-Oriented Security Architecture for CII based on Sensor Networks. In: 2nd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006), Lyon (France) (June 2006)

    Google Scholar 

  7. Camtepe, A., Yener, B.: Key distribution mechanisms for wireless sensor networks: a survey. Rensselaer Polytechnic Institute, Computer Science Department, Tech. Rep. 05-07 (March 2005)

    Google Scholar 

  8. Karlof, C., Sastry, N., Wagner, D.: TinySec: a link layer security architecture for wireless sensor networks. In: Proceedings of 2nd International Conference on Embedded Networked Sensor Systems (SensSys 2004) (November 2004)

    Google Scholar 

  9. Moteiv Corporation, http://www.moteiv.com

  10. Smart Infrastructure. The Cambridge-MIT Institute, http://www.cambridge-mit.org/smartinfrastructure

  11. Sensor Nets RFID. Intel Corporation, http://www.intel.com/research/exploratory/wireless_sensors.htm

  12. Distributed Intelligence, Sensing and Coordination in Variable Environments. CSIRO, http://www.ict.csiro.au/page.php?cid=97

  13. Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM conference on Computer and communications security (CCS 2002), pp. 41–47. ACM Press, New York (2002)

    Chapter  Google Scholar 

  14. Du, W., Deng, J., Han, Y.S., Varshney, P.: A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge. IEEE Transactions on Dependable and Secure Computing 3(2), 62–77 (2006)

    Google Scholar 

  15. Du, W., Deng, J., Han, Y.S., Varshney, P.K.: A pairwise key pre-distribution scheme for wireless sensor networks. In: Proceedings of the 10th ACM conference on Computer and communications security (CCS 2003), pp. 42–51. ACM Press, New York (2003)

    Chapter  Google Scholar 

  16. Pietro, R.D., Mancini, L.V., Mei, A.: Random key-assignment for secure Wireless Sensor Networks. In: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (SASN 2003), pp. 62–71. ACM Press, New York (2003)

    Chapter  Google Scholar 

  17. Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: 2003 IEEE Symposium on Security and Privacy, May 2003, pp. 197–213 (2003)

    Google Scholar 

  18. Lee, J., Stinson, D.R.: Deterministic Key Predistribution Schemes for Distributed Networks. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 294–307. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  19. Liu, D., Ning, P., Li, R.: Establishing Pairwise Keys in Distributed Sensor Networks. ACM Transactions on Information and System Security 8(1), 41–77 (2005)

    Article  Google Scholar 

  20. Anderson, R.J., Chan, H., Perrig, A.: Key Infection: Smart Trust for Smart Dust. In: Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP 2004), October 2004, pp. 206–215 (2004)

    Google Scholar 

  21. Liu, D., Ning, P.: Improving Key Pre-Distribution with Deployment Knowledge in Static Sensor Networks. ACM Transactions on Sensor Networks (TOSN) 1(2), 204–239 (2005)

    Article  Google Scholar 

  22. Camtepe, A., Yener, B.: Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. In: Samarati, P., Ryan, P.Y.A., Gollmann, D., Molva, R. (eds.) ESORICS 2004. LNCS, vol. 3193, pp. 293–308. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  23. Hwang, D.D., Charles Lai, B., Verbauwhede, I.: Energy-Memory-Security Tradeoffs in Distributed Sensor Networks. In: Nikolaidis, I., Barbeau, M., Kranakis, E. (eds.) ADHOC-NOW 2004. LNCS, vol. 3158. Springer, Heidelberg (2004)

    Google Scholar 

  24. Hwang, J., Kim, Y.: Revisiting Random Key Pre-distribution Schemes for Wireless Sensor Networks. In: Proceedings of the 2nd ACM workshop on Security of Ad Hoc and Sensor Networks (SASN 2004), pp. 43–52. ACM Press, New York (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Alcaraz, C., Roman, R. (2006). Applying Key Infrastructures for Sensor Networks in CIP/CIIP Scenarios. In: Lopez, J. (eds) Critical Information Infrastructures Security. CRITIS 2006. Lecture Notes in Computer Science, vol 4347. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11962977_14

Download citation

  • DOI: https://doi.org/10.1007/11962977_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69083-2

  • Online ISBN: 978-3-540-69084-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics