Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Dynamic and secure key management model for hierarchical heterogeneous sensor networks

Dynamic and secure key management model for hierarchical heterogeneous sensor networks

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Many applications that utilise wireless sensor networks (WSNs) require essentially secure communication. However, WSNs suffer from some inherent weaknesses because of restricted communication and hardware capabilities. Key management is the crucial important building block for all security goals in WSNs. Most existing researches tried to assign keys assuming homogeneous network architecture. Recently, a few key management models for heterogeneous WSNs have been proposed. In this study, the authors propose a dynamic key management framework based on elliptical curve cryptography and signcryption method for heterogeneous WSNs. The proposed scheme has network scalability and sensor node (SN) mobility especially in liquid environments. Moreover, both periodic authentication and a new registration mechanism are proposed through prevention of SN compromise. The authors analyse some of the more seminal hierarchical heterogeneous WSN key management schemes and compare them with the proposed scheme. On comparing the proposed scheme with the more seminal hierarchical heterogeneous WSN key management schemes, the proposed framework individually proves to be better in terms of communication, computation and key storage.

References

    1. 1)
      • Perrig, A., Szewczyk, R., Wen, V., Cullar, D., Tygar, J.D.: `SPINS: Security protocols for sensor networks', Seventh Annual ACM/IEEE Int. Conf. Mobile Computing and Networking, July 2001, p. 189–99.
    2. 2)
    3. 3)
    4. 4)
    5. 5)
      • C. De Canniere , O. Dunkelman , M. Knezeví . (2009) KATAN and KTANTAN – a family of small and efficient hardware-oriented block ciphers.
    6. 6)
    7. 7)
    8. 8)
      • Bjorstad Tor, E.: `Provable security of signcryption', June 2005, Masters, Norwegian University of Technology and Science, Norway.
    9. 9)
    10. 10)
    11. 11)
    12. 12)
      • A. Bogdanov , L.R. Knudsen , G. Leander . (2007) PRESENT: an ultra-lightweight block cipher.
    13. 13)
      • Samundiswary, P., Priyadarshini, P., Dananjayan, P.: `Performance evaluation of heterogeneous sensor networks', IEEE Int. Conf. on Future Computer and Communication, 2009, p. 264–267.
    14. 14)
      • Liu, D., Ning, P.: `Establishing pairwise keys in distributed sensor networks', 10thACM Conf. on Computer and Communications Security (CCS03), ACM Press, 2003, Washington, DC, p. 41–7.
    15. 15)
      • Pei, Q., Wang, L., Yin, H., Pang, L., Tang, H.: `Layer key management scheme on wireless sensor networks', Fifth Int. Conf. Information Assurance and Security, IEEE Computer Society, 2009.
    16. 16)
      • Y. Zheng . (1997) Digital Signcryption or how to achieve Cost (Signature & Encryption)=Cost(Signature)+Cost(Encryption).
    17. 17)
      • Boujelben, M., Cheikhrouhou, O., Abid, M., Youssef, H.: `A pairing identity based key management protocol for heterogeneous wireless sensor networks', IEEE Trans. Wireless Communications Conf., 2009.
    18. 18)
      • Miracle Software Package Version: 5.5.4, http://www.shamus.ie.
    19. 19)
      • D. Hankerson , A. Menezes , S. Vanstone . (2004) Guide to elliptic curve cryptography.
    20. 20)
      • Eschenauer, L., Gligor, V.D.: `A key management scheme for distributed sensor networks', Ninth ACM Conf. on Computer and Communication Security, November 2002, p. 41–47.
    21. 21)
      • S.M. Khaliq-ur-Rahman Raazi , H. Lee , S. Lee , Y.-K. Lee . MUQAMI+: A scalable and locally distributed key management scheme for clustered sensor networks. Ann. Telecommun. (ISSN: 0003–4347) , 101 - 116
    22. 22)
      • J. Lopez , J. Zhou . (2008) Overview of wireless sensor network security.
    23. 23)
      • Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: `Comparing elliptic curve cryptography and RSA on 8-bit CPUs'c', The Sixth Int. Workshop on Cryptographic Hardware and Embedded Systems, Boston, Massachusetts.
    24. 24)
    25. 25)
    26. 26)
    27. 27)
      • Yu, Z., Guan, Y.: `A robust group-based key management scheme for wireless sensor networks', IEEE Wireless Communications and Networking Conf. (WCNC), 2005, New Orleans, LA, USA, p. 137.
    28. 28)
    29. 29)
      • Chan, H., Perrig, A.: `Random key predistribution schemes for sensor networks', IEEE Symp. Security and Privacy, 2003, p. 197–213.
    30. 30)
      • Blundo, C., Santix, A.D., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: `Perfectly secure key distribution for dynamic conferences', 12thAnnual Int. Cryptology Conf. on Advances in Cryptology, Springer, 1992, p. 471–486.
    31. 31)
      • Hagras, E.A.A.A., EI-Saied, D., Aly, H.H.: `Energy efficient key management scheme based on elliptic curve signcryption for wireless sensor networks', 28thNational Radio Science Conf. (NRSC), 2011.
    32. 32)
    33. 33)
    34. 34)
      • Collins, M., Dobson, S., Nixon, P.: `A secure lightweight architecture for wireless sensor networks', The Second Int. Conf. on Mobile Ubiquitous Computing, Systems, Services and Technologies, IEEE Computer Society, 2008.
    35. 35)
      • Malan, D.J., Welsh, M., Smith, M.D.: `A public-key infrastructure for key distribution in TinyOs based on elliptic curve cryptography', First Annual IEEE Communications Society Conf. on Sensor and ad hoc Communications and Networks, 2004, IEEE SECON, L.B.
    36. 36)
    37. 37)
      • Alagheband, M., Soleimanipour, M., Aref, M.: `A new signcryption scheme with forward security', Fourth Information Security and Cryptology Int. Conf. (ISCISC), 2007, Tehran, Iran.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2012.0144
Loading

Related content

content/journals/10.1049/iet-ifs.2012.0144
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address