An Authentication Key Establish Protocol for WSNs Based on Combined Key

Advances in lattice-based cryptography are enabling the use of public key algorithms (PKAs) in power-constrained ad hoc and sensor network devices. Unfortunately, while many wireless networks are dominated by group communications, PKAs are inherently unicast—i.e., public/private key pairs are generated by data destinations. To fully realize public key cryptography in these networks, lightweight PKAs should be augmented with energy efficient mechanisms for group key agreement. Recently, many key management schemes for the WSNs have been proposed, but the computation and communication costs of these protocols are too high to suitable for WSNs. This paper proposes a key establish protocol for the WSNs based on combined key. The protocol adopts seed key mapping technology to achieve two-party and multi-party key establish in the WSNs, it can generate a large number of combination keys with little resources. So it effectively solve the contradiction between the sensor nodes need large storage space to store shared key with their neighbors and their limited storage space. It can also achieve mutual authentication between nodes when they establish shared key. Analysis shows that the proposed protocol has the advantages in storage efficiency, computation consumption and Communication consumption and suitable for wireless networks.

[1]  Douglas R. Stinson,et al.  On the Construction of Practical Key Predistribution Schemes for Distributed Sensor Networks Using Combinatorial Designs , 2008, TSEC.

[2]  Jun Hwang,et al.  A Novel Design Technique Using Extended PMCP(Program and Metadata Communication Protocol) for ACAP(Advanced Common Application Platform) , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).

[3]  Xu Li,et al.  A novel key pre-distribution scheme using one-way hash chain and bivariate polynomial for wireless sensor networks , 2009, 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication.

[4]  Jian Shen,et al.  Enhanced secure sensor association and key management in wireless body area networks , 2015, Journal of Communications and Networks.

[5]  Huang Hai-ping Key distribution scheme of wireless sensor networks based on logic grid , 2009 .

[6]  T. Subash,et al.  Novel key pre-distribution scheme in wireless sensor network , 2011, 2011 International Conference on Emerging Trends in Electrical and Computer Technology.

[7]  Muhammad Sher,et al.  A Lightweight Key Freshness Scheme for Wireless Sensor Networks , 2015, 2015 12th International Conference on Information Technology - New Generations.

[8]  Eleftheria Makri,et al.  Constant round group key agreement protocols: A comparative study , 2011, Comput. Secur..

[9]  Marco Zennaro,et al.  Successful deployment of a Wireless Sensor Network for precision agriculture in Malawi , 2012, NESEA.

[10]  Ming Li,et al.  Secure ad hoc trust initialization and key management in wireless body area networks , 2013, TOSN.

[11]  M. Berenjkoub,et al.  An efficient end to end key establishment protocol for wireless sensor networks , 2012, 2012 9th International ISC Conference on Information Security and Cryptology.

[12]  Luis Orozco-Barbosa,et al.  Authenticated Group Key Agreement Protocols for Ad hoc Wireless Networks , 2007, Int. J. Netw. Secur..

[13]  Douglas R. Stinson,et al.  A unified approach to combinatorial key predistribution schemes for sensor networks , 2014, IACR Cryptol. ePrint Arch..

[14]  Aart Blokhuis,et al.  Note on the size of binary Armstrong codes , 2014, Des. Codes Cryptogr..

[15]  Marine Minier,et al.  Key establishment and management for WSNs , 2012, Telecommun. Syst..

[16]  Wei Li,et al.  A Hybrid Authenticated Group Key Agreement Protocol in Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[17]  Yoon-Su Jeong,et al.  Key Pre-distribution Scheme for Little Storage Space and Strong Security Strength in Large-Scale Wireless Sensor Network , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).

[18]  Zezhong Zhang,et al.  Fuzzy Identity-Based Key Agreement Scheme for Wireless Sensor Networks , 2012 .

[19]  Wei Li Camera Sensor Activation Scheme for Target Tracking in Wireless Visual Sensor Networks , 2013, Int. J. Distributed Sens. Networks.

[20]  Ashok Kumar Das,et al.  An Enhanced Access Control Scheme in Wireless Sensor Networks , 2014, Ad Hoc Sens. Wirel. Networks.

[21]  Keith M. Martin,et al.  On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks , 2009, IWCC.

[22]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[23]  Dharma P. Agrawal,et al.  Enhanced location based key pre-distribution scheme for secure communication in Wireless Sensor Network (WSN) , 2010, The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010).

[24]  Chuan-Ming Liu,et al.  Enhancing the Key Pre-distribution Scheme on Wireless Sensor Networks , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.

[25]  Yang Geng A Key Establish Scheme for WSN Based on IBE and Diffie-Hellman Algorithms , 2007 .

[26]  Suhua Liu,et al.  CPK-Based Authentication and Key Agreement Protocols with Anonymity for Wireless Network , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[27]  Mingxing He,et al.  Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks , 2006, CANS.

[28]  Xiaochen Li,et al.  Energy-Efficient Group Key Agreement for Wireless Networks , 2015, IEEE Transactions on Wireless Communications.

[29]  Elisavet Konstantinou Cluster-based Group Key Agreement for Wireless Ad hoc Networks , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[30]  M. Ylianttila,et al.  Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications , 2015, IEEE Access.

[31]  Lei Feng-Yu,et al.  Ad Hoc Networks Security Mechanism Based on CPK , 2007, 2007 International Conference on Computational Intelligence and Security Workshops (CISW 2007).