access icon free Intra-cluster key sharing in hierarchical sensor networks

In hierarchical sensor networks, key sharing at the intra-cluster tier (i.e. how to establish pairwise keys between a sensor and its cluster head) is more challenging than that at inter-cluster tier. Despite some key management protocols have been proposed, there still lacks both secure and efficient one. In this study, the authors proposed an intra-cluster key sharing to overcome the security problems nowadays. The analysis proved that this proposed scheme has the following advantages by comparing with other schemes: (i) it is more efficient in saving the storage overheads and communication overheads; (ii) it improves the resilience against node capture attacks during and after initialisation; and (iii) it guarantees 100% connectivity at intra-cluster communication tier.

Inspec keywords: protocols; telecommunication security; wireless sensor networks

Other keywords: security problems; communication overheads; intra-cluster communication tier; cluster head; intra-cluster key sharing; wireless sensor networks; hierarchical sensor networks; node capture attacks; key management protocols; storage overheads; intra-cluster tier

Subjects: Protocols; Wireless sensor networks

References

    1. 1)
      • 13. Cheng, Y., Agrawal, D.P.: ‘An improved key distribution mechanism for large-scale hierarchical wireless sensor networks’, Ad Hoc Netw., 2007, 5, (1), pp. 3548 (doi: 10.1016/j.adhoc.2006.05.011).
    2. 2)
      • 4. Chan, H., Perrig, A., Song, D.: ‘Random key predistribution schemes for sensor networks’. Proc. IEEE 2003 Symp. on Security and Privacy, 2003, pp. 197213.
    3. 3)
      • 19. Huang, D., Mehta, M., Medhi, D., Harn, L.: ‘Location-aware key management scheme for wireless sensor networks categories and subject descriptors’. The Second ACM workshop on Security of ad hoc and Sensor Networks, 2004, pp. 2942.
    4. 4)
      • 11. Jolly, G., Kuscu, M., Kokate, P., Younis, M.: ‘A low-energy key management protocol for wireless sensor networks’. Eighth IEEE Symp. on Computers and Communications, 2003, pp. 335340.
    5. 5)
      • 12. Liu, D., Ning, P., Du, W.: ‘Group-based key predistribution for wireless sensor networks’, ACM Trans. Sensor Netw., 2008, 4, (2), pp. 130 (doi: 10.1145/1340771.1340777).
    6. 6)
      • 14. Du, X., Xiao, Y., Guizani, M., Chen, H.: ‘An effective key management scheme for heterogeneous sensor networks’, Ad Hoc Netw., 2007, 5, (1), pp. 2434 (doi: 10.1016/j.adhoc.2006.05.012).
    7. 7)
      • 18. Shamir, A.: ‘How to share a secret’, Commun. ACM, 1979, 22, (11), pp. 612613 (doi: 10.1145/359168.359176).
    8. 8)
      • 9. Crossbow Technology Inc., http://www.xbow.com.
    9. 9)
      • 5. Jaworski, J., Ren, M., Rybarczyk, K.: ‘Random key predistribution for wireless sensor networks using deployment knowledge’, Computing, 2009, 85, pp. 5776 (doi: 10.1007/s00607-009-0036-9).
    10. 10)
      • 6. Liu, D., Ning, P., Du, W.: ‘Group-based key predistribution for wireless sensor networks’, ACM Trans. Sensor Netw., 2008, 4, (2), pp. 130 (doi: 10.1145/1340771.1340777).
    11. 11)
      • 8. Bohge, M., Trappe, W.: ‘An authentication framework for hierarchical ad hoc sensor networks’. The Second ACM workshop on Wireless security, 2003, pp. 7987.
    12. 12)
      • 7. Delgosha, F., Fekri, F.: ‘A multivariate key-establishment scheme for wireless sensor networks’, IEEE Trans. Wirel. Commun., 2009, 8, (4), pp. 18141824 (doi: 10.1109/TWC.2009.071338).
    13. 13)
      • 3. Eschenauer, L., Gligor, V.D.: ‘A key-management scheme for distributed sensor networks’. Proc. Ninth ACM Conf. on Computer and Communications Security, 2002, pp. 4147.
    14. 14)
      • 1. Carman, D., Kruus, P., Matt, B.: ‘Constraints and approaches for distributed sensor network security (final)’, NAI Labs Technical Report, 2000, pp.1139, available at http://download.nai.com.
    15. 15)
      • 16. Blom, R.: ‘An optimal class of symmetric key generation system’. The EUROCRYPT 84 workshop on Advances in Cryptology: Theory and Application of Cryptographic Techniques, 1985, pp. 335338.
    16. 16)
      • 2. Chen, C.Y., Chao, H.C.: ‘A survey of key distribution in wireless sensor networks’, Secur. Commun. Netw., 2011.
    17. 17)
      • 17. Liu, Y.N., Wang, J., Du, H.: ‘Threshold key sharing model in wireless sensor networks’, J. Electron. Inf. Technol., 2011, 33, (8), pp. 19131918 (doi: 10.3724/SP.J.1146.2010.01155).
    18. 18)
      • 15. Boujelben, M., Cheikhrouhou, O., Abid, M., Youssef, H.: ‘Establishing pairwise keys in heterogeneous two-tiered wireless sensor networks’. 2009 Third Int. Conf. on Sensor Technologies and Applications, 2009, pp. 442448.
    19. 19)
      • 10. Girod, L., Stathopoulos, T., Ramanathan, N., et al: ‘A system for simulation, emulation, and deployment of heterogeneous sensor networks’. ACM Second Int. Conf. on Embedded Networked Sensor Systems, 2004, pp. 201213.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-wss.2012.0155
Loading

Related content

content/journals/10.1049/iet-wss.2012.0155
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading