An Efficient Authentication and Key Management Protocol for Hierarchical Ad Hoc Sensor Networks

Despite extensive research on flat ad hoc networks, meeting satisfactory security levels in sensor networks presents many problems. The main reason is that these networks are typically designed based on hierarchal structures. In this paper, we propose an efficient scheme for authentication and key management in hierarchical ad hoc sensor networks using symmetric polynomials. In the proposed method, the processing requirements and traffic load are proportional to the processing capability and required bandwidth in each layer. An ad hoc node at the lowest level of the hierarchy uses symmetric cryptography. With more processing capabilities, entities in higher layers use public key cryptography. Performance results show the superiority of the proposed method in comparison with previous approaches developed for hierarchical ad hoc sensor networks.

[1]  Yuguang Fang,et al.  Scalable Link-Layer Key Agreement in Sensor Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[2]  Boon-Chong Seet,et al.  The Handbook of Ad Hoc Wireless Networks , 2002 .

[3]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[4]  Yuguang Fang,et al.  A Scalable Key Agreement Scheme for Large Scale Networks , 2006, 2006 IEEE International Conference on Networking, Sensing and Control.

[5]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[6]  Panganamala Ramana Kumar,et al.  RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .

[7]  Dipankar Raychaudhuri,et al.  Routing protocols for self-organizing hierarchical ad-hoc wireless networks , 2003 .

[8]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[9]  Yuguang Fang,et al.  A Survey of Wireless Security in Mobile Ad Hoc Networks: Challenges and Available Solutions , 2004 .

[10]  Levente Buttyán,et al.  Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks , 2006, IEEE Transactions on Mobile Computing.

[11]  Qiang Huang,et al.  An unbalanced key establishment scheme for heterogeneous wireless networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[12]  P. Borwein,et al.  Polynomials and Polynomial Inequalities , 1995 .

[13]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[14]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[15]  Wade Trappe,et al.  An authentication framework for hierarchical ad hoc sensor networks , 2003, WiSe '03.

[16]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[17]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[18]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[19]  Dejan Simic,et al.  A Survey of Wireless Security , 2007, J. Comput. Inf. Technol..