A random key management scheme for heterogeneous wireless sensor network

Key management is one of the most challenging security problems in wireless sensor network (WSN). A complete key management scheme should include key generation, key distribution, and key updating. Random key predistribution scheme is widely considered as the most suitable for WSN. However, network security connectivity contradicts resilience, and related research lacks key updating. To address these problems, a random key management scheme for heterogeneous WSN is proposed. Deployment knowledge is introduced into q-composite random key predistribution, and key updating mechanism is designed. Theoretical analysis and simulation show that the scheme can effectively improve network connectivity, support scalability, and ensure key effective without affecting security connectivity and resilience.

[1]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[2]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[3]  Jerzy Jaworski,et al.  Random key predistribution for wireless sensor networks using deployment knowledge , 2009, Computing.

[4]  Ozgur Koray Sahingoz,et al.  Large scale wireless sensor networks with multi-level dynamic key management scheme , 2013, J. Syst. Archit..

[5]  Mohamed Abid,et al.  RiSeG: a ring based secure group communication protocol for resource-constrained wireless sensor networks , 2011, Personal and Ubiquitous Computing.

[6]  Yeh-Ching Chung,et al.  Heterogeneous Wireless Sensor Network Deployment and Topology Control Based on Irregular Sensor Model , 2007, GPC.

[7]  Hung-Min Sun,et al.  Practical RSA signature scheme based on periodical rekeying for wireless sensor networks , 2012, TOSN.

[8]  Sencun Zhu,et al.  Predistribution and local collaboration-based group rekeying for wireless sensor networks , 2009, Ad Hoc Networks.

[9]  Catherine Rosenberg,et al.  A minimum cost heterogeneous sensor network with a lifetime constraint , 2005, IEEE Transactions on Mobile Computing.

[10]  Neeraj Mittal,et al.  Cluster-Based Key Predistribution Using Deployment Knowledge , 2010, IEEE Transactions on Dependable and Secure Computing.

[11]  Suresh Singh,et al.  Exploiting heterogeneity in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[12]  Huifang Chen,et al.  One-way hash chain-based self-healing group key distribution scheme with collusion resistance capability in wireless sensor networks , 2013, Ad Hoc Networks.

[13]  Ieee Staff,et al.  2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) , 2015 .

[14]  Yunghsiang Sam Han,et al.  A key predistribution scheme for sensor networks using deployment knowledge , 2006, IEEE Transactions on Dependable and Secure Computing.