
 
nodes. If this key setup time completes in short time, 
an adversary has very little time to eavesdrop on key 
setup. Compromising a node does not offer the 
adversary any added advantage in deducing these 
keys. Key Infection establishes key as: every sensor 
node simply decides a key and broadcasts it in 
plaintext to its neighbors. For example a node i, after 
deployment, broadcasts a key k
i
. Due to short-range 
nature of transmission, possibly half a dozen other 
nodes within range of i, notice each other’s presence 
and start self-organization. Another node j after 
hearing  i’s signal, produces a pair wise key k
j
  and 
sends it, along with its name, to i:{  j,  k
ji
}  k
i
. 
Minimum power essential for the link is used to 
transmit the packet. The key k
ji
 is used between i 
and  j. Perrig et al. argued that only 2.4% of links 
will be compromised if there is one hostile sensor 
node for every 100 white nodes, and there are four 
neighbors in the range of each node. Plaintext key 
exchange protocol does not provide protection for 
confidentiality, integrity, and node authentication. 
Another drawback of this approach is that an 
adversary can inject malicious nodes into the 
network, since there is no authentication mechanism 
to verify whether a sensor node is a valid member. 
In  key pre-distribution schemes, secret keys or 
secret information is distributed to every sensor node 
prior to deployment into the sensing area. Gligor et 
al. (L. Eschenaur and V. Gligor, 2002) proposed the 
probabilistic key pre-deployed scheme, which is 
regarded as basic scheme. In this scheme, key setup 
completes in three phases: key pre-distribution, 
shared-key discovery, and path-key establishment 
respectively.  
Figure 4 shows the key pre-distribution phase in 
which each sensor node holds k distinct keys, 
randomly chosen from a big key pool having size P 
where P>> k. This set of k keys carried by each node 
is called key ring. An identifier is attached with each 
key.  Shared key discovery phase starts with the 
deployment of nodes in which each node discovers 
its neighbors to share common keys in its radio 
range. Links are established between the nodes at the 
end of shared-key discovery phase. Path-key 
establishment phase is the last phase in which pairs 
of nodes are connected that want to establish a 
secure link but they are not sharing a common key. 
These pairs of nodes can be reachable by two or 
more hops. Perrig et al. (H. Chan et al., 2003) 
modified Gligor’s scheme for proficient handling of 
bootstrapping problem. This scheme is more 
resilient against node capture. In this scheme, 
instead of using one common key for key 
establishment, q common keys are required for key 
setup with a hash function. Figure 5 demonstrates 
this scheme (B. Lai, 2002). 
It is possible that many nodes in the sensor 
network can share that same key. If one of these 
nodes is compromised, all other nodes sharing the 
same key will also be compromised. Du et al. (W. 
Du et al., 2004) has proposed a model, in which the 
sensor nodes are deployed in groups, so in each 
group the nodes have high probability to be near to 
each other. So the basic idea is to let the nodes 
deployed near to each other select keys from sub-
key pools that share more keys. In the scheme, 
because each node carries fewer keys, the memory 
efficiency and resilience are both improved. 
3 SAKE: SECURE 
AUTHENTICATED KEY 
ESTABLISHMENT 
In key establishment techniques based on master key 
schemes, master key is a single point of failure. 
Deng et al. (J. Deng et al.), demonstrated that time 
to deploy a sensor network is very important. The 
key setup phase may need to be extended until all 
nodes are activated, or arrive at their destination. In 
such cases, the master key would live for several 
minutes. If an adversary knows the memory area 
precisely from which to draw the keys, then the node 
compromise time is in the tens of seconds. So it is 
quite possible for an adversary to physically capture 
a node and compromise the master key during its 
key setup phase. The challenge in this scenario is to 
protect the network from its single point of failure. 
This challenge can be met if key establishment 
process would be made less dependent on master 
key. This can be done if the individual key of each 
sensor node would be made an active participant in 
key establishment process along with the master 
key.  This load balancing approach will protect the 
master key from becoming a single point of failure. 
Moreover, in a situation when master key is 
compromised, it is required that a typical key 
establishment technique would not enable an 
adversary to compute all pairwise keys with the help 
of master key. 
We propose Secure Authentication Key 
Establishment (SAKE) protocol, which is based on 
master key scheme. SAKE supports the 
establishment of pairwise shared keys between the 
nodes of a sensor network. SAKE is dissimilar from 
other master key schemes as it makes key 
establishment less dependent on master key. Firstly, 
SAKE - Secure Authenticated Key Establishment in Sensor Networks
157