Skip to Content

Secure Key Management in Mobile Ad Hoc Networks


 
 
Secure communications in wireless ad hoc networks require setting up end-to-end secret keys for communicating node pairs. It is widely believed that although being more complex, a probabilistic key predistribution scheme is much more resilient against node capture than a deterministic one in lightweight wireless ad hoc networks. Supported by the surprisingly large successful attack probabilities (SAPs) computed in this project, we show that the probabilistic approaches have only limited performance advantages over deterministic approaches. We first consider a static network scenario as originally considered in the seminal paper by Eschenauer and Gligor (E&G), where any node capture happens after the establishment of all pairwise links. In this scenario, we show that the deterministic approach can achieve a performance as good as the probabilistic one. In a mobile network scenario, however, the probabilistic key management as described in E&G can lead to a SAP of one order of magnitude larger than the one in a static network due to node fabrication attacks.

The above analysis motivates us to propose two low-cost secure-architecture-based techniques to improve the security against such attacks. Our new architectures, specifically targeted at the sensor-node platform, protect long-term keys using a root of trust embedded in the hardware System-on-a-Chip (SoC). This prevents an adversary from extracting these protected long-term keys from a captured node to fabricate new nodes. The extensive simulation results show that the proposed architecture can significantly decrease the SAP and increase the security level of key management for mobile ad hoc networks.

 
 
 
Project Team
NCEL Member: Jianwei Huang
Collaborators: Mung Chiang (Princeton University), Jeffrey Dwoskin (Princeton University), Tian Lan (Princeton University), Ruby Lee (Princeton University), and Dahai Xu (AT&T Lab)

 

 
 
Publications
2007
Xu, Dahai, et al. Re-examining Probabilistic Versus Deterministic Key Management. IEEE International Symposium on Information Theory. Nice, France, 2007. Download: ISIT07[1].pdf (159.72 KB)
Dwoskin, Jeffrey, et al. Secure Key Management Architecture Against Sensor-Node Fabrication Attacks. IEEE Global Communications Conference., 2007. Download: Key_Globecom07[1].pdf (126.48 KB)
2010
Xu, Dahai, et al. Key Management in Sensor Networks." Theoretical Aspects of Distributed Computing in Sensor Networks . Springer, 2010.  Download: KeyBookChapterFinal.pdf (566.27 KB)

 

 



story | by Dr. Radut