A Dynamic Distributed Key Tunneling Protocol for Heterogeneous Wireless Sensor Networks

Wireless Sensor Networks (WSNs) are being used for many applications ranging from mobile target surveillance to intelligent home networking. The data transmitted by those applications are sensitive. Then due to the weakness of the radio links, appropriate protection mechanisms are needed to prevent attackers from exploiting those lacks of security. In this paper we present a solution to authenticate the nodes and protect the sent data. We investigate the use of secure tunnels as a solution to improve the protection of WSNs. We propose a tunneling scheme that conforms to the security requirements of WSNs while having less computational and network overhead. A set of experiments has been conducted to assess the performance of the proposed scheme with regard to traditional tunnels built using the IPSec protocol. We found that our protocol considerably reduces the number of transmitted messages as well as the computational load, which makes it suitable for WSNs.

[1]  T. Subash,et al.  Novel key pre-distribution scheme in wireless sensor network , 2011, 2011 International Conference on Emerging Trends in Electrical and Computer Technology.

[2]  Huagang Xiong,et al.  An Efficient Key Management Scheme for Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.

[3]  Valérie Issarny,et al.  An efficient group key agreement protocol for ad hoc networks , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.

[4]  Chee-Onn Chow,et al.  A Novel Secure Key Management Module for Hierarchical Clustering Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.

[5]  Naixue Xiong,et al.  A real-time dynamic key management for hierarchical wireless multimedia sensor network , 2013, Multimedia Tools and Applications.

[6]  Hugo Krawczyk,et al.  A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..

[7]  Zheng Huang,et al.  A novel dynamic key management scheme for wireless sensor networks , 2011, 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology.

[8]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[9]  Stephen T. Kent,et al.  Security Architecture for the Internet Protocol , 1998, RFC.

[10]  Mohamed Hamdi,et al.  An elliptic threshold signature framework for k-security in wireless sensor networks , 2008, 2008 15th IEEE International Conference on Electronics, Circuits and Systems.

[11]  Mohamed Hamdi,et al.  Coverage Control and Irregular Radio Propagation in Wireless Sensor Networks , 2009, 2009 IEEE Wireless Communications and Networking Conference.

[12]  Charlie Kaufman,et al.  Internet Key Exchange (IKEv2) Protocol , 2005, RFC.

[13]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[14]  Mohammad S. Obaidat,et al.  WHOMoVeS: An optimized broadband sensor network for military vehicle tracking , 2008, Int. J. Commun. Syst..