Energy efficient geographical key management scheme for authentication in mobile wireless sensor networks

In wireless sensor networks, a sensor node communicates with a small set of neighbour sensor nodes and with the base station through a group leader or a cluster head. However, in some occasions, a sensor node required to move in the sensor networks. The node has to change its own position with the requirement of applications. Considering this phenomena, in this paper, we propose to design an angular function and private key management system authenticated by group leader for the transmission of a node. In the proposed scheme, the group is divided into sectors. The motion of the node is related with the angles to the group leader, which is the basis of our proposal. The nodes movement and activity should be tracked. The proposed scheme attains high connectivity and security with the help of the directional transreceiver. The lifetime of a node is increased, and it enables a node to move through the network and to transmit data to its neighbors.

[1]  Xiaolei Dong,et al.  Securing m-healthcare social networks: challenges, countermeasures and future directions , 2013, IEEE Wireless Communications.

[2]  Athanasios V. Vasilakos,et al.  CDC: Compressive Data Collection for Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[3]  Athanasios V. Vasilakos,et al.  Software-Defined and Virtualized Future Mobile and Wireless Networks: A Survey , 2014, Mobile Networks and Applications.

[4]  Tai-Myoung Chung,et al.  An Energy-Efficient Dynamic Key Management in Wireless Sensor Networks , 2007, The 9th International Conference on Advanced Communication Technology.

[5]  Ozgur Koray Sahingoz,et al.  Large scale wireless sensor networks with multi-level dynamic key management scheme , 2013, J. Syst. Archit..

[6]  Athanasios V. Vasilakos,et al.  Information centric network: Research challenges and opportunities , 2015, J. Netw. Comput. Appl..

[7]  Athanasios V. Vasilakos,et al.  Cross-Layer Support for Energy Efficient Routing in Wireless Sensor Networks , 2009, J. Sensors.

[8]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[9]  Athanasios V. Vasilakos,et al.  Directional routing and scheduling for green vehicular delay tolerant networks , 2012, Wireless Networks.

[10]  Xiaolei Dong,et al.  4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks , 2015, Inf. Sci..

[11]  Athanasios V. Vasilakos,et al.  Delay Tolerant Networks: Protocols and Applications , 2011 .

[12]  V. ANNAPOORANI,et al.  SPATIAL REUSABILITY-AWARE ROUTING IN MULTI-HOP WIRELESS NETWORKS , 2016 .

[13]  Naixue Xiong,et al.  Context-Aware Middleware for Multimedia Services in Heterogeneous Networks , 2010, IEEE Intelligent Systems.

[14]  Athanasios V. Vasilakos,et al.  Prediction-based data aggregation in wireless sensor networks: Combining grey model and Kalman Filter , 2011, Comput. Commun..

[15]  Ismail Mansour,et al.  Energy-efficient Security Protocol for Wireless Sensor Networks using Frequency Hopping and Permutation Ciphering , 2011, PECCS.

[16]  Yi Liang,et al.  A Survey on Topology Control in Wireless Sensor Networks: Taxonomy, Comparative Study, and Open Issues , 2008, Proceedings of the IEEE.

[17]  Rohith Singi Reddy Key Management in Wireless Sensor Networks Using a Modified Blom Scheme , 2011, ArXiv.

[18]  Athanasios V. Vasilakos,et al.  Approximating Congestion + Dilation in Networks via "Quality of Routing" Games , 2012, IEEE Trans. Computers.

[19]  Athanasios V. Vasilakos,et al.  Reliable Multicast with Pipelined Network Coding Using Opportunistic Feeding and Routing , 2014, IEEE Transactions on Parallel and Distributed Systems.

[20]  Athanasios V. Vasilakos,et al.  DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis , 2010, IEEE/ACM Transactions on Networking.

[21]  Vinod Kumar,et al.  Evaluation of Security Conditions of Protocols for Data Routing in Wireless Sensors Networks , 2011 .

[22]  Haijun LiangChao Wang An Energy Efficient Dynamic Key Management Scheme Based on Polynomial and Cluster in Wireless Sensor Netwoks , 2011 .

[23]  Heejo Lee,et al.  An Energy-Efficient Secure Routing and Key Management Scheme for Mobile Sinks in Wireless Sensor Networks Using Deployment Knowledge , 2008, Sensors.

[24]  Laurence T. Yang,et al.  Scalable and efficient key management for heterogeneous sensor networks , 2008, The Journal of Supercomputing.

[25]  Athanasios V. Vasilakos,et al.  Local Area Prediction-Based Mobile Target Tracking in Wireless Sensor Networks , 2015, IEEE Transactions on Computers.

[26]  Athanasios V. Vasilakos,et al.  Tight Performance Bounds of Multihop Fair Access for MAC Protocols in Wireless Sensor Networks and Underwater Sensor Networks , 2012, IEEE Transactions on Mobile Computing.

[27]  Athanasios V. Vasilakos,et al.  Backpressure-based routing protocol for DTNs , 2010, SIGCOMM '10.

[28]  Naixue Xiong,et al.  Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems , 2009, IEEE Journal on Selected Areas in Communications.

[29]  Athanasios V. Vasilakos,et al.  EDAL: An Energy-Efficient, Delay-Aware, and Lifetime-Balancing Data Collection Protocol for Heterogeneous Wireless Sensor Networks , 2015, IEEE/ACM Transactions on Networking.

[30]  Radha Poovendran,et al.  Mitigation of Control Channel Jamming under Node Capture Attacks , 2009, IEEE Transactions on Mobile Computing.

[31]  Yue Zhang,et al.  Interference-Based Topology Control Algorithm for Delay-Constrained Mobile Ad Hoc Networks , 2015, IEEE Transactions on Mobile Computing.

[32]  Mohsen Guizani,et al.  A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks , 2007, 2007 IEEE International Conference on Communications.

[33]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[34]  Athanasios V. Vasilakos,et al.  A Biology-Based Algorithm to Minimal Exposure Problem of Wireless Sensor Networks , 2014, IEEE Transactions on Network and Service Management.

[35]  Shusen Yang,et al.  A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities , 2013, IEEE Wireless Communications.

[36]  Witold Pedrycz,et al.  An Evolutionary Multiobjective Sleep-Scheduling Scheme for Differentiated Coverage in Wireless Sensor Networks , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[37]  Athanasios V. Vasilakos,et al.  EDAL: An Energy-Efficient, Delay-Aware, and Lifetime-Balancing Data Collection Protocol for Wireless Sensor Networks , 2013, 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems.

[38]  Mohamed F. Younis,et al.  A low-energy key management protocol for wireless sensor networks , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.

[39]  Athanasios V. Vasilakos,et al.  Physarum Optimization: A Biology-Inspired Algorithm for the Steiner Tree Problem in Networks , 2015, IEEE Transactions on Computers.

[40]  Sun,et al.  Review of Key Management Mechanisms in Wireless Sensor Networks , 2006 .

[41]  Athanasios V. Vasilakos,et al.  Leveraging software-defined networking for security policy enforcement , 2016, Inf. Sci..

[42]  Athanasios V. Vasilakos,et al.  SecCloud: Bridging Secure Storage and Computation in Cloud , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops.

[43]  Athanasios V. Vasilakos,et al.  Hierarchical Data Aggregation Using Compressive Sensing (HDACS) in WSNs , 2015, ACM Trans. Sens. Networks.

[44]  Athanasios V. Vasilakos,et al.  ECG-Cryptography and Authentication in Body Area Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.

[45]  Junghyun Lee,et al.  Energy Efficient Key Management Protocol in Wireless Sensor Networks , 2010 .

[46]  Seung-Woo Seo,et al.  Topological Key Hierarchy for Energy-Efficient Group Key Management in Wireless Sensor Networks , 2010, Wirel. Pers. Commun..

[47]  Athanasios V. Vasilakos,et al.  ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.

[48]  Athanasios V. Vasilakos,et al.  Provably secure three-party authenticated key agreement protocol using smart cards , 2014, Comput. Networks.

[49]  Athanasios V. Vasilakos,et al.  Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks , 2016, IEEE Transactions on Computers.

[50]  Athanasios V. Vasilakos,et al.  A Distributed Trust Evaluation Model and Its Application Scenarios for Medical Sensor Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.

[51]  Virendra Pal Singh,et al.  Hello Flood Attack and its Countermeasures in Wireless Sensor Networks , 2010 .

[52]  Naixue Xiong,et al.  Multi-layer clustering routing algorithm for wireless vehicular sensor networks , 2010, IET Commun..

[53]  Athanasios V. Vasilakos,et al.  Interoperable and adaptive fuzzy services for ambient intelligence applications , 2010, TAAS.

[54]  Athanasios V. Vasilakos,et al.  Algorithm design for data communications in duty-cycled wireless sensor networks: A survey , 2013, IEEE Communications Magazine.

[55]  Mohsen Guizani,et al.  Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.

[56]  Chee-Yee Chong,et al.  Sensor networks: evolution, opportunities, and challenges , 2003, Proc. IEEE.

[57]  François-Xavier Standaert,et al.  On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[58]  Athanasios V. Vasilakos,et al.  Compressed data aggregation for energy efficient wireless sensor networks , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.