A Secret Sharing-Based Key Management in Hierarchical Wireless Sensor Network

Wireless sensor networks (WSNs) are subject to various attacks because of the vulnerable environment, limited recourse, and open communication channel. To protect WSNs, in this paper, we present a Secret sharing-based key management (SSKM). SSKM utilizes the advantages of hierarchical architecture and adopts two-level key management and authentication mechanism, which can efficiently protect the allover network communication security and survivability. Different from previous works, the SSKM distributes keys based on secret sharing mechanism by the clustered architecture, which not only localizes the key things but also keeps scalability. The SSKM provides various session keys, the network key for base station (BS) and cluster heads (CHs); the cluster key between the cluster head and member nodes. The SSKM dynamically generates different keys based on different polynomials from BS in different periods which can protect the network from the compromised nodes and reduce the high probability of the common keys. The security analysis shows that the SSKM can prevent several attacks effectively and reduce the energy consumption.

[1]  M. Luk,et al.  MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[2]  Mohamed Eltoweissy,et al.  Dynamic key management in sensor networks , 2006, IEEE Communications Magazine.

[3]  Baojiang Cui,et al.  A Secure Hierarchical Key Management Scheme in Wireless Sensor Network , 2012, Int. J. Distributed Sens. Networks.

[4]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[5]  Yuqing Zhang,et al.  Efficient (n, t, n) secret sharing schemes , 2012, J. Syst. Softw..

[6]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[7]  Achour Mostéfaoui,et al.  Low-Cost Secret-Sharing in Sensor Networks , 2010, 2010 IEEE 12th International Symposium on High Assurance Systems Engineering.

[8]  Xiaofeng Liao,et al.  Verifiable multi-secret sharing based on LFSR sequences , 2012, Theor. Comput. Sci..

[9]  Marcelo Dias de Amorim,et al.  Securing wireless sensor networks against aggregator compromises , 2008, IEEE Communications Magazine.

[10]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[11]  Naixue Xiong,et al.  A real-time dynamic key management for hierarchical wireless multimedia sensor network , 2013, Multimedia Tools and Applications.

[12]  Myong-Soon Park,et al.  An AVL Tree-Based Dynamic Key Management in Hierarchical Wireless Sensor Network , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[13]  Shashank Agrawal Verifiable secret sharing in a total of three rounds , 2012, Inf. Process. Lett..

[14]  V. Katiyar A Survey on Clustering Algorithms for Heterogeneous Wireless Sensor Networks , 2011 .

[15]  Mohsen Guizani,et al.  An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.

[16]  Rachid Beghdad,et al.  Securing Wireless Sensor Networks: A Survey , 2013, EDPACS.

[17]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.