A novel key management scheme for hierarchical wireless sensor networks

Due to the hostile environment and the limitations of the wireless sensor networks (WSN for short), a feasible and efficient key management scheme becomes one of the critical issues in WSN. Many protocols proposed before didn't pay much attention to the key protection and revocation issues. So, to address these problems, we put forward a new dynamically clustering key management scheme based on secret sharing for WSN. In this paper, we divide the master key into several sub keys by adopting the main idea of threshold secret sharing scheme, combing the clustering structure of WSN with dynamic key management scheme, and finally propose a new key management scheme. Compared to other key management schemes, our protocol has strong security and resistance of captured attack as well as low computational overhead and storage.

[1]  Omar Cheikhrouhou,et al.  Establishing Pairwise Keys in Heterogeneous Two-Tiered Wireless Sensor Networks , 2009, 2009 Third International Conference on Sensor Technologies and Applications.

[2]  Yuguang Fang,et al.  Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[3]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[4]  Victor C. M. Leung,et al.  Key management issues in wireless sensor networks: current proposals and future developments , 2007, IEEE Wireless Communications.

[5]  Donggang Liu,et al.  Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks , 2002, NDSS.

[6]  Vijay Varadharajan,et al.  Wireless sensor network key management survey and taxonomy , 2010, J. Netw. Comput. Appl..

[7]  Thomas F. La Porta,et al.  Establishing Pair-Wise Keys in Heterogeneous Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[8]  Prasan Kumar Sahoo,et al.  Efficient security mechanisms for the distributed wireless sensor networks , 2005, Third International Conference on Information Technology and Applications (ICITA'05).

[9]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[10]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[11]  Antonio Alfredo Ferreira Loureiro,et al.  On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks , 2005, ICN.

[12]  Dharma P. Agrawal,et al.  An improved key distribution mechanism for large-scale hierarchical wireless sensor networks , 2007, Ad Hoc Networks.

[13]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[14]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[15]  Soumendra Nath Lahiri,et al.  Security and performance analysis of a secure clustering protocol for sensor networks , 2007, Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007).

[16]  Yau-Hwang Kuo,et al.  Two-Layered Dynamic Key Management in Mobile and Long-Lived Cluster-Based Wireless Sensor Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[17]  Ricardo Dahab,et al.  SecLEACH - On the security of clustered sensor networks , 2007, Signal Process..

[18]  Paulo S. L. M. Barreto,et al.  A survey on key management mechanisms for distributed Wireless Sensor Networks , 2010, Comput. Networks.