SeGCom: A secure group communication mechanism in cluster-tree wireless sensor networks

Security is a challenging issue in Wireless Sensor Networks (WSNs) due to the dual impact of their inherent constraints and their operation in open and harsh environments. The problem of securing a WSN becomes even more complex when considering group communications. In this paper, we address this problem and propose a new security mechanism for group communications in cluster-tree WSNs. We define a group as a set of sensor nodes in the cluster-tree network sharing the same sensory information (e.g. temperature, pressure, etc.). Our objective is to limit the access to the group data exclusively to the members that have securely joined the group. The main contributions of the paper are (1) the proposal of an efficient and secure group management mechanism for cluster-tree networks, and (2) a secure key distribution between group members. Finally, our security analysis shows that the proposed scheme is efficient and secure.

[1]  Roberto Di Pietro,et al.  LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[2]  Philip Levis,et al.  TinyOS Programming: Introduction , 2009 .

[3]  Sanjay Kumar Madria,et al.  A secure hierarchical model for sensor network , 2004, SGMD.

[4]  John Anderson,et al.  Wireless sensor networks for habitat monitoring , 2002, WSNA '02.

[5]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[6]  Zinaida Benenson,et al.  Realizing Robust User Authentication in Sensor Networks , 2005 .

[7]  Guohong Cao,et al.  Group rekeying for filtering false data in sensor networks: a predistribution and local collaboration-based approach , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[8]  Rajiv Gandhi,et al.  Minimizing broadcast latency and redundancy in ad hoc networks , 2003, MobiHoc '03.

[9]  Weina Lu,et al.  A Synchronous Detection of the Road Boundary and Lane Marking for Intelligent Vehicles , 2007 .

[10]  Nuno Pereira,et al.  Disseminating data using broadcast when topology is unknown , 2005, RTSS 2005.

[11]  Wuu Yang,et al.  An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[12]  Deep Medhi,et al.  Location-aware key management scheme for wireless sensor networks , 2004, SASN '04.

[13]  Byrav Ramamurthy,et al.  Secure Group Communications Over Data Networks , 2004 .

[14]  Zhiqiang Du,et al.  Efficient Broadcast Authentication in Wireless Sensor Networks , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.

[15]  Jianhua Li,et al.  ACKDs: An Authenticated Combinatorial Key Distribution Scheme for Wireless Sensor Networks , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).

[16]  Sezaki Kaoru,et al.  A Proposal of Secure Group Communication for Wireless Sensor Networks , 2003 .

[17]  Ashok Kumar Das,et al.  An effective group-based key establishment scheme for large-scale wireless sensor networks using bivariate polynomials , 2008, 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08).

[18]  Dong Hoon Lee,et al.  A Key Distribution Scheme for Wireless Sensor Networks , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).

[19]  Zheng Yuan,et al.  Intrusion Detection for Wireless Sensor Networks Based on Multi-agent and Refined Clustering , 2009, 2009 WRI International Conference on Communications and Mobile Computing.

[20]  Dharma P. Agrawal,et al.  An improved key distribution mechanism for large-scale hierarchical wireless sensor networks , 2007, Ad Hoc Networks.

[21]  Dawn Song,et al.  The TESLA Broadcast Authentication Protocol , 2002 .

[22]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[23]  Lei Zhang,et al.  Grouping-Based Clustering Routing Protocol in Wireless Sensor Networks , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[24]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[25]  Ingrid Verbauwhede,et al.  Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks , 2006, ESAS.

[26]  Roberto Di Pietro,et al.  Confidentiality and integrity for data aggregation in WSN using peer monitoring , 2009, Secur. Commun. Networks.

[27]  Yong Wang,et al.  Group Rekeying Schemes for Secure Group Communication in Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.