A Key Management Scheme for Mobile Wireless Sensor Networks

Symmetric encryption is the most commonly employed security solution in wireless sensor networks (WSNs). In this paper, a new approach that employs public-key cryptography during key establishment is proposed. In a WSN, the main issue for public-key cryptography is represented by communication and computational overheads. In order to reduce these requirements, a new authentication system based on authentication tables is proposed. An analytical study shows that the proposed approach provided optimal protection against an adversary that compromised one or more nodes. A comparative analysis shows that, according to the dimension and the density of the network, the proposed approach can represent the best solution. Furthermore, an experimental analysis conducted on a real network shows that the proposed approach can be successfully applied to devices with limited computational power.

[1]  Srikanta Kumar Sahoo,et al.  An Elliptic-Curve-Based Hierarchical Cluster Key Management in Wireless Sensor Network , 2013, ICACNI.

[2]  Maurizio Rebaudengo,et al.  A Key Distribution Scheme for Mobile Wireless Sensor Networks: $q$ - $s$ -Composite , 2017, IEEE Transactions on Information Forensics and Security.

[3]  K. Lauter,et al.  The advantages of elliptic curve cryptography for wireless security , 2004, IEEE Wireless Communications.

[4]  Abdul Hanan Abdullah,et al.  EDR: efficient data routing in wireless sensor networks , 2013, Int. J. Ad Hoc Ubiquitous Comput..

[5]  Joan Garcia-Haro,et al.  An Analytical Approach to the Optimal Deployment of Wireless Sensor Networks , 2008 .

[6]  Maurizio Rebaudengo,et al.  Fast Hierarchical Key Management Scheme With Transitory Master Key for Wireless Sensor Networks , 2016, IEEE Internet of Things Journal.

[7]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[8]  Yan Zhang,et al.  Superframe Planning and Access Latency of Slotted MAC for Industrial WSN in IoT Environment , 2014, IEEE Transactions on Industrial Informatics.

[9]  Nadjib Badache,et al.  Fast authentication in wireless sensor networks , 2016, Future Gener. Comput. Syst..

[10]  Vijay Varadharajan,et al.  Wireless sensor network key management survey and taxonomy , 2010, J. Netw. Comput. Appl..

[11]  David E. Culler,et al.  TinyOS: An Operating System for Sensor Networks , 2005, Ambient Intelligence.

[12]  M. Bala Krishna,et al.  Deterministic K‐means secure coverage clustering with periodic authentication for wireless sensor networks , 2017, Int. J. Commun. Syst..

[13]  Xiang Wang,et al.  Postharvest Quality Monitoring and Variance Analysis of Peach and Nectarine Cold Chain with Multi-Sensors Technology , 2017 .

[14]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[15]  Guang Gong,et al.  Accelerating signature-based broadcast authentication for wireless sensor networks , 2012, Ad Hoc Networks.

[16]  Sudip Misra,et al.  Detouring dynamic routing holes in stationary wireless sensor networks in the presence of temporarily misbehaving nodes , 2017, Int. J. Commun. Syst..

[17]  Joan Claudi Socoró,et al.  Description of Anomalous Noise Events for Reliable Dynamic Traffic Noise Mapping in Real-Life Urban and Suburban Soundscapes , 2017 .

[18]  Jürgen Jasperneite,et al.  Computer Communication Within Industrial Distributed Environment—a Survey , 2013, IEEE Transactions on Industrial Informatics.

[19]  Shahaboddin Shamshirband,et al.  Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks , 2014, J. Netw. Comput. Appl..

[20]  Albert Levi,et al.  Two-Tier, Scalable and Highly Resilient Key Predistribution Scheme for Location-Aware Wireless Sensor Network Deployments , 2010, Mob. Networks Appl..

[21]  Philip Levis,et al.  The nesC language: a holistic approach to networked embedded systems , 2003, SIGP.

[22]  Robert H. Deng,et al.  Detecting node replication attacks in wireless sensor networks: A survey , 2012, J. Netw. Comput. Appl..

[23]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[24]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[25]  Haw Yun Shin,et al.  Implementing a green bicycle alliance using a wireless sensor network , 2014, Int. J. Ad Hoc Ubiquitous Comput..

[26]  Han-Chieh Chao,et al.  A survey of key distribution in wireless sensor networks , 2014, Secur. Commun. Networks.

[27]  Maurizio Rebaudengo,et al.  Key Management for Static Wireless Sensor Networks With Node Adding , 2014, IEEE Transactions on Industrial Informatics.

[28]  Alan Dahgwo Yein,et al.  Using a Random Secret Pre-Distribution Scheme to Implement Message Authentication in VANETs , 2015 .

[29]  Amir Masoud Rahmani,et al.  HOCA: Healthcare Aware Optimized Congestion Avoidance and control protocol for wireless sensor networks , 2014, J. Netw. Comput. Appl..