Mobile node authentication using key distribution scheme in wireless sensor networks

We consider the problem of secure communication in mobile Wireless Sensor Networks (WSNs). Achieving security in WSNs requires robust encryption and authentication standards among the sensor nodes. Severe resources constraints in typical Wireless Sensor nodes hinder them in achieving key agreements. It is proved from past studies that many notable key management schemes do not work well in sensor networks due to their limited capacities. The idea of key predistribution is not feasible considering the fact that the network could scale to millions. We prove a novel algorithm that provides robust and secure communication channel in WSNs. Our Double Encryption with Validation Time (DEV) using Key Management Protocol algorithm works on the basis of timed sessions within which a secure secret key remains valid. A mobile node is used to bootstrap and exchange secure keys among communicating pairs of nodes. Analysis and simulation results show that the performance of the DEV using Key Management Protocol Algorithm is better than the SEV scheme and other related work.

[1]  Cheng-Hung Liu,et al.  A moving algorithm for non-uniform deployment in mobile sensor networks , 2011, Int. J. Auton. Adapt. Commun. Syst..

[2]  L.M. Patnaik,et al.  Adaptive Mobility and Availability of a Mobile Node for Efficient Secret Key Distribution inWireless Sensor Networks , 2010, 2010 Second International Conference on Machine Learning and Computing.

[3]  Ahmed Bouridane,et al.  Improving Key Distribution forWireless Sensor Networks , 2007, Second NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2007).

[4]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[5]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[6]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[7]  Sebnem Baydere,et al.  Network capacity analysis for code propagation in Wireless Sensor Networks , 2011, Int. J. Ad Hoc Ubiquitous Comput..

[8]  Taha Landolsi,et al.  Energy consumption considerations in dynamic wireless sensor networks with nodes and base stations mobility , 2010, Int. J. Sens. Networks.

[9]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[10]  Victor C. M. Leung,et al.  Mobile Agent Based Wireless Sensor Networks , 2006, J. Comput..

[11]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[12]  Tatsuhiro Tsuchiya,et al.  A self-organising algorithm for sensor placement in wireless mobile microsensor networks , 2008, Int. J. Wirel. Mob. Comput..

[13]  L M Patnaik,et al.  Resilience Key Predistribution Scheme using Asymmetric Matrices for Wireless Sensor Networks , 2009, 2009 IEEE International Advance Computing Conference.

[14]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.

[15]  Krishna R. Narayanan,et al.  Weakly Secure Network Coding , 2005 .

[16]  Jörg Widmer,et al.  Network coding: an instant primer , 2006, CCRV.

[17]  Xinrong Li Collaborative multi-sensor tracking in mobile wireless sensor networks , 2010, Int. J. Sens. Networks.

[18]  Judith Kelner,et al.  Evaluation of security mechanisms in wireless sensor networks , 2005, 2005 Systems Communications (ICW'05, ICHSN'05, ICMCS'05, SENET'05).

[19]  João Barros,et al.  A Network Coding Approach to Secret Key Distribution , 2008, IEEE Transactions on Information Forensics and Security.

[20]  Debao Xiao,et al.  Secure-SPIN: Secure Sensor Protocol for Information via Negotiation for Wireless Sensor Networks , 2006, 2006 1ST IEEE Conference on Industrial Electronics and Applications.

[21]  Chu-Sing Yang,et al.  A cell-based sensor deployment strategy with improved coverage for mobility-assisted hybrid wireless sensor networks , 2010, Int. J. Ad Hoc Ubiquitous Comput..

[22]  Kuo-Feng Ssu,et al.  A moving algorithm for non-uniform deployment in mobile sensor networks , 2008, Mobility '08.