Cluster Based Dynamic Keying Technique for Authentication in Wireless Sensor Networks

This paper proposes a Cluster Based Dynamic Keying Technique (CBDKT) for authentication in wireless sensor networks. The Cluster Head (CH) determines a Combined Cost Value (CCV) for each sensor node based on node location, node degree and residual battery power. Since the key to the encryption scheme changes dynamically when there is a change in CCV, separate dynamic keys are generated in each cluster by the CH. While the source CH forwards the data to the sink along different clusters, verification of authenticity is done. When the source CH needs to transmit the aggregated data packet to the sink, it splits the packet into shares by threshold secret sharing algorithm and forwards them to the sink using multi-path dispersal routing technique.

[1]  Albert Y. Zomaya,et al.  Security Issues in Wireless Sensor Networks , 2006, 2006 International Conference on Systems and Networks Communications (ICSNC'06).

[2]  Karl N. Levitt,et al.  iBubble: Multi-Keyword Routing Protocol for Heterogeneous Wireless Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[3]  Shan Guo Quan,et al.  Fast Data Aggregation Algorithm for Minimum Delay in Clustered Ubiquitous Sensor Networks , 2008, 2008 International Conference on Convergence and Hybrid Information Technology.

[4]  Yun Wang Intrusion Detection in Gaussian Distributed Heterogeneous Wireless Sensor Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[5]  C.-S. Lu,et al.  Constrained Function-Based Message Authentication for Sensor Networks , 2011, IEEE Transactions on Information Forensics and Security.

[6]  Xiaofeng Han,et al.  Fault-Tolerant Relay Node Placement in Heterogeneous Wireless Sensor Networks , 2010, IEEE Trans. Mob. Comput..

[7]  John A. Stankovic,et al.  Probability grid: a location estimation scheme for wireless sensor networks , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[8]  Zoran Bojkovic,et al.  Some security trends over wireless sensor networks , 2008, ICC 2008.

[9]  Jalel Ben-Othman,et al.  REER: Robust and Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[10]  Huang Jie,et al.  A key-chain based key management scheme for heterogeneous sensor network , 2010 .

[11]  Xiaotie Deng,et al.  TinyPairing: Computing Tate Pairing on Sensor Nodes with Higher Speed and Less Memory , 2009, 2009 Eighth IEEE International Symposium on Network Computing and Applications.

[12]  Ronald L. Rivest,et al.  The RC5 Encryption Algorithm , 1994, FSE.

[13]  Sarma B. K. Vrudhula,et al.  A framework for battery-aware sensor management , 2004, Proceedings Design, Automation and Test in Europe Conference and Exhibition.

[14]  Masaaki Shirase,et al.  Efficient Implementation of Pairing-Based Cryptography on a Sensor Node , 2009, IEICE Trans. Inf. Syst..

[15]  Gerhard Goos,et al.  Fast Software Encryption , 2001, Lecture Notes in Computer Science.

[16]  Joseph M. Hellerstein,et al.  Clock Skew Based Node Identification in Wireless Sensor Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[17]  Meikang Qiu,et al.  Energy minimization for heterogeneous wireless sensor networks , 2009, J. Embed. Comput..

[18]  Zinaida Benenson,et al.  Realizing Robust User Authentication in Sensor Networks , 2005 .

[19]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[20]  Chin-Ling Chen,et al.  Dynamic Session-Key Generation for Wireless Sensor Networks , 2008, EURASIP J. Wirel. Commun. Netw..

[21]  Joel J. P. C. Rodrigues,et al.  Improved robust user authentication scheme for wireless sensor networks , 2009, 2009 Fifth International Conference on Wireless Communication and Sensor Networks (WCSN).

[22]  Mohsen Guizani,et al.  Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.

[23]  Raheem A. Beyah,et al.  VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[24]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[25]  Joonsang Baek,et al.  Authentication and Key Establishment in Dynamic Wireless Sensor Networks , 2010, Sensors.