Chip-Based symmetric and asymmetric key generation in hierarchical wireless sensors networks

Realization of an application using Wireless Sensor Networks (WSNs) using Sensor Nodes (SNs) brings in profound advantages of ad-hoc and flexible network deployments. Implementation of these networks face immense challenges due to short wireless range; along with limited power, storage & computational capabilities of SNs. Also, due to the tiny physical attributes of the SNs in WSNs, they are prone to physical attacks. In the context of WSNs, the physical attacks may range from destroying, lifting, replacing and adding new SNs. The work in this paper addresses the threats induced due to physical attacks and, further proposes a methodology to mitigate it. The methodology incorporates the use of newly proposed secured and efficient symmetric and asymmetric key distribution technique based on the additional commodity hardware Trusted Platform Module (TPM). Further, the paper demonstrates the merits of the proposed methodology. With some additional economical cost for the hardware, the proposed technique can fulfill the security requirement of WSNs, like confidentiality, integrity, authenticity, resilience to attack, key connectivity and data freshness.

[1]  Matt Welsh,et al.  Sensor networks for emergency response: challenges and opportunities , 2004, IEEE Pervasive Computing.

[2]  Yongge Wang,et al.  Public Key Cryptography Standards: PKCS , 2012, ArXiv.

[3]  Yong Wang,et al.  A security framework for wireless sensor networks utilizing a unique session key , 2008, 2008 5th International Conference on Broadband Communications, Networks and Systems.

[4]  Manisha J. Nene,et al.  A security framework for military application on infrastructure based wireless sensor network , 2015, 2015 IEEE International Conference on Research in Computational Intelligence and Communication Networks (ICRCICN).

[5]  Miodrag Potkonjak,et al.  On communication security in wireless ad-hoc sensor networks , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[6]  Donggang Liu,et al.  Multilevel μTESLA: Broadcast authentication for distributed sensor networks , 2004, TECS.

[7]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[8]  Manisha J. Nene,et al.  MITE: Memory integrity based trust evaluation in Wireless Sensor Networks , 2015, 2015 International Conference on Communication Networks (ICCN).

[9]  Wen Hu,et al.  A key distribution protocol for Wireless Sensor Networks , 2012, 37th Annual IEEE Conference on Local Computer Networks.

[10]  Amir Hossein Jahangir,et al.  Analysis of Public-Key Cryptography for Wireless Sensor Networks Security , 2008 .

[11]  Berk Sunar,et al.  Public Key Cryptography in Sensor Networks - Revisited , 2004, ESAS.

[12]  Rajendra S. Deodhar,et al.  Algorithm for Autonomous Reorganization of Mobile Wireless Camera Sensor Networks to Improve Coverage , 2015, IEEE Sensors Journal.

[13]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[14]  Kouichi Sakurai,et al.  Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[15]  Tarek F. Abdelzaher,et al.  Range-free localization schemes for large scale sensor networks , 2003, MobiCom '03.

[16]  Peter I. Corke,et al.  secFleck: A Public Key Technology Platform for Wireless Sensor Networks , 2009, EWSN.