180 likes | 287 Vues
This paper examines advancements in pairwise key establishment methods within wireless network security, addressing issues in basic key pre-distribution and proposing polynomial-based solutions. It discusses the limitations of guaranteed key establishment in sensor networks and introduces a robust polynomial pool approach for key distribution. By generating bivariate polynomials, the methodology ensures efficient key establishment while minimizing storage overhead for sensors. The study analyses the benefits of direct and path key establishment methods, improving resilience against sensor compromise and ensuring secure authentication between sensor pairs.
E N D
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang
Pairwise key establishment with guarantee • Problems of basic key pre-distribution and Chan’s improvement • The key establishment is not guaranteed • Tolerance to sensor compromise • Polynomial based key pre-distribution • Random subset assignment approach • Grid based key distribution
Polynomial based key distribution • A bivariate t-degree polynomial f(x, y) is generated • It has the property of f(x, y) = f(y, x) • For every sensor i, we can replace x with i and generate a new poly f(i, y) • When sensor i meets sensor j, node i can calculate f(i, j), node j can calculate f(j, i); • The two keys are the same
Overhead • Every sensor needs to store a t-degree poly • Evaluation of the polynomial • Robustness • Need at least t+1 nodes to figure out a poly • Problem • Want to further reduce overhead • Improvement • Using a group of polynomials
Polynomial pool based key pre-distribution • We generate a pool of bivariate polynomials • When we have only one poly, it returns to the previous method • When all poly are 0-degree, it returns to the basic approach • Each sensor gets a subset of polys • Direct key establishment • Path key establishment
Random subset assignment – approach 1 • Every sensor gets a random set of polys • Analysis of key sharing • Directly b/w two sensors • Through one hop neighbors • Similar to the basic approach • Then what is the advantage of using poly to replace a key • ?
Grid based key pre-distribution • Guaranteed key establishment • Improved resilience to sensor compromise • “Zero” interaction to figure out the key – except the node identity
We have n sensors, n < m * m • Every sensor can be mapped to a unique point in the m*m matrix • Generate 2m polynomial, one for each row and one for each column • For a sensor at position (i, j), the corresponding row and column polys will be given to the node
Any two sensors in the same row or column will share a poly – they can derive the key • If the two sensors are not in the same row or column • Locate the node that can establish keys with both nodes
Advantages • Storage overhead: every node only stores two polys • A sensor can directly figure out can it establish a key to the other sensor
Key pre-distribution based on Blom’s scheme • Improve resilience to sensor compromise • Authentication between sensor pair
Blom’s key pre-distribution • Generate a (λ+1) * N matrix G, N is the size of the network, λ is the threshold of tolerance. The matrix is public • Generate a (λ+1) * (λ+1) symmetric matrix D and keep it as secret • A = (D * G)^T, A is a N * (λ+1) matrix • Since D is symmetric, we have A*G = (A*G)^T, so A*G is a symmetric matrix
If we let K = A*G, then Kij = Kji • See example of the calculation • Every node i will have ith row of A and ith column of G • When node i and j meet, they exchange the columns of G and calculate Kij and Kji
Blom’s scheme guarantees that any two sensors can find a key. But we do not need such dense keys • If we generate multiple Blom’s matrices, each can be viewed as a key space
Approach • Generate one matrix G • Generate w matrix D1, D2, ---, Dw, we can calculate A1=(D1 * G)^T, A2=(D2 * G)^T, ---, Aw=(Dw * G)^T. • Every node will select t key spaces and get corresponding information from the matrices. • If two sensors have the same key space, they can generate a key.
Analysis of key space sharing • Similar to the basic mechanisms • What is the probability that a key space is compromised? • Need at least (λ+1) sensors holding this key space • When x nodes are broken, the probability that j of them know the key space is:
When the key space is not compromised, pairwise keys can be used to authenticate