An Efficient and Secure Session Key Management Scheme in Wireless Sensor Network

Wireless Sensor Network (WSN) is a particular network built from small sensor nodes. These sensor nodes have unique features. That is, it can sense and process data in WSN. WSN has tremendous applications in many fields. Despite the significance of WSN, this kind of network faced several issues. The biggest problems rising in WSN are energy consumption and security. Robust security development is needed to cope with WSN applications. For security purposes in WSN, cryptography techniques are very favorable. However, WSN has resource limitations, which is the main problem in applying any security scheme. Hence, if we are using the cryptography scheme in WSN, we must first guarantee that it must be energy-efficient. Thus, we proposed a secure hybrid session key management scheme for WSN. In this scheme, the major steps of public key cryptography are minimized, and much of the operations are based on symmetric key cryptography. This strategy extensively reduces the energy consumption of WSN and ensures optimum security. The proposed scheme is implemented, and their analysis is performed using different parameters with benchmark schemes. We concluded that the proposed scheme is energy-efficient and outperforms the available benchmark schemes. Furthermore, it provides an effective platform for secure key agreements and management in the WSN environment.

[1]  M. Castillo-Effer,et al.  Wireless sensor networks for flash-flood alerting , 2004, Proceedings of the Fifth IEEE International Caracas Conference on Devices, Circuits and Systems, 2004..

[2]  Levent Ertaul,et al.  ECC Based Threshold Cryptography for Secure Data Forwarding and Secure Key Exchange in MANET (I) , 2005, NETWORKING.

[3]  Ehab Mahmoud Mohamed,et al.  A Trust-Based Energy-Efficient and Reliable Communication Scheme (Trust-Based ERCS) for Remote Patient Monitoring in Wireless Body Area Networks , 2020, IEEE Access.

[4]  Tang Hong,et al.  A Novel Authenticated Group Key Agreement Protocol Based on Elliptic Curve Diffie-Hellman , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[5]  Ingrid Moerman,et al.  A Secure Low-Delay Protocol for Wireless Body Area Networks , 2010, Ad Hoc Sens. Wirel. Networks.

[6]  Haseeb Ur Rahman,et al.  An efficient and secure session key establishment scheme for health-care applications in wireless body area networks , 2018 .

[7]  Wang Yi,et al.  A novel group key agreement protocol for wireless sensor networks , 2009, 2009 International Conference on Wireless Communications & Signal Processing.

[8]  Sherali Zeadally,et al.  Anonymous Authentication for Wireless Body Area Networks With Provable Security , 2017, IEEE Systems Journal.

[9]  Asha Rao,et al.  Lightweight Cryptographic Protocols for IoT-Constrained Devices: A Survey , 2021, IEEE Internet of Things Journal.

[10]  Shaoen Wu,et al.  Dynamic Trust Relationships Aware Data Privacy Protection in Mobile Crowd-Sensing , 2018, IEEE Internet of Things Journal.

[11]  Bachar El-Hassan,et al.  A Secure Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptography , 2007, Third International Symposium on Information Assurance and Security.

[12]  Willy Susilo,et al.  Secure Message Communication Protocol Among Vehicles in Smart City , 2018, IEEE Transactions on Vehicular Technology.

[13]  Haitao Zhang,et al.  A review of wireless sensor networks and its applications , 2012, 2012 IEEE International Conference on Automation and Logistics.

[14]  Wei Zhang,et al.  GROUP: A Grid-Clustering Routing Protocol for Wireless Sensor Networks. , 2006, 2006 International Conference on Wireless Communications, Networking and Mobile Computing.

[15]  Subhasish Banerjee,et al.  An Efficient User Authentication and Session Key Agreement in Wireless Sensor Network Using Smart Card , 2021, Wirel. Pers. Commun..

[16]  Sherali Zeadally,et al.  Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things , 2018, IEEE Transactions on Industrial Informatics.

[17]  S. Sastry,et al.  Security and Privacy Issues with Health Care Information Technology , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.

[18]  Gyula Simon,et al.  Sensor network-based countersniper system , 2004, SenSys '04.

[21]  Qian Ren,et al.  An Energy-Efficient Cluster Head Selection Scheme for Energy-Harvesting Wireless Sensor Networks , 2019, Sensors.

[22]  Muhammad Khurram Khan,et al.  A key agreement algorithm with rekeying for wireless sensor networks using public key cryptography , 2010, 2010 International Conference on Anti-Counterfeiting, Security and Identification.

[23]  Jiang Wu,et al.  Three Improved Algorithms for Multipath Key Establishment in Sensor Networks Using Protocols for Secure Message Transmission , 2011, IEEE Transactions on Dependable and Secure Computing.