A decentralized energy-aware key management scheme for Wireless Sensor Networks

The popularity of Wireless Sensor Networks (WSNs) is increasing especially in applications where data needs to be remotely collected, such as in fire detection, health, or environmental monitoring. WSN nodes are limited in terms of processing capabilities and battery life. Thus, encryption is usually avoided and the readings are sent in the clear. This allows any eavesdropper to access data that could be confidential. Lightweight encryption techniques are proposed to overcome the limitations of sensor nodes. Identity-based encryption (IBE) that uses elliptic curve cryptography (ECC) seems to be very promising in terms of energy efficiency. Since the issue of key management is critical for a security system, we propose a novel decentralized IBE-based key management scheme that reduces the energy by using multiple base stations. The keys are pre-distributed in the WSN and refreshed at specific time intervals. The system ensures confidentiality of the messages and the availability of WSN service even when multiple nodes and base stations are compromised, at a significant reduction in overall system energy.

[1]  Rehan Akbani,et al.  Elliptic curve cryptosystem and its applications , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).

[2]  Huan-Chung Lin,et al.  A Scalable ID-Based Pairwise Key Establishment Protocol for Wireless Sensor Networks , 2007 .

[3]  Amir Hossein Jahangir,et al.  Analysis of Public-Key Cryptography for Wireless Sensor Networks Security , 2008 .

[4]  Dong Hoon Lee,et al.  Classification of Key Management Schemes for Wireless Sensor Networks , 2007, APWeb/WAIM Workshops.

[5]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[6]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[7]  Michele Nogueira Lima,et al.  Identity-based key management in mobile ad hoc networks: techniques and applications , 2008, IEEE Wireless Communications.

[8]  Kenneth G. Paterson,et al.  Key Refreshing in Identity-Based Cryptography and its Applications in MANETs , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[9]  Ian Goldberg,et al.  Distributed Private-Key Generators for Identity-Based Cryptography , 2010, SCN.

[10]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[11]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[12]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[13]  Qing Zhang,et al.  A Framework for Identifying Compromised Nodes in Wireless Sensor Networks , 2008, TSEC.

[14]  Milind Dawande,et al.  Energy efficient schemes for wireless sensor networks with multiple mobile base stations , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[15]  Dharma P. Agrawal,et al.  Threshold and identity-based key management and authentication for wireless ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..

[16]  Myung J. Lee,et al.  A lightweight encryption and authentication scheme for wireless sensor networks , 2006, Int. J. Secur. Networks.

[17]  Michael Scott,et al.  On the application of pairing based cryptography to wireless sensor networks , 2009, WiSec '09.

[18]  Yong Wang,et al.  A Key Management Protocol for Wireless Sensor Networks with Multiple Base Stations , 2008, 2008 IEEE International Conference on Communications.