Secured Communication Key Establishment for Cluster-Based Wireless Sensor Networks

The resource-constraint nature of wireless sensor networks (WSNs) has caused the security one of biggest challenges. An efficient key management scheme is the pre-requisite to ensure security in WSN. In this paper the authors present two versions of a secured key management scheme adopted on cluster-based topology of sensor network. The proposed schemes use partial key pre-distribution and symmetric cryptography techniques, and shows high resilience to different security attacks. Whereas one version of the proposed protocol uses shared partial keys in a cluster, the other version uses private partial keys. Both versions of the proposed key management scheme outperform other random key pre- distribution protocols in the sense that it requires lower space, lower communication overhead and offers very high session key candidates.

[1]  Sushil Jajodia,et al.  Secure Data Aggregation in Wireless Sensor Networks , 2008 .

[2]  Mohamed Eltoweissy,et al.  Dynamic key management in sensor networks , 2006, IEEE Communications Magazine.

[3]  T. Subash,et al.  Novel key pre-distribution scheme in wireless sensor network , 2011, 2011 International Conference on Emerging Trends in Electrical and Computer Technology.

[4]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[5]  Xueping Li,et al.  A Quantitative Survivability Evaluation Model for Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Networking, Sensing and Control.

[6]  Yuguang Fang,et al.  Location-based compromise-tolerant security mechanisms for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.

[7]  Quazi Mamun,et al.  A Qualitative Comparison of Different Logical Topologies for Wireless Sensor Networks , 2012, Sensors.

[8]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[9]  Yuguang Fang,et al.  Securing sensor networks with location-based keys , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[10]  F. Kausar,et al.  A Random Key Distribution Scheme for Securing Wireless Sensor Network , 2006, 2006 IEEE International Multitopic Conference.

[11]  Wen Qiao-Yan,et al.  Secure Pairwise Key Establishment for Key Predistribution in Wireless Sensor Networks , 2012, 2012 International Conference on Computer Science and Service System.

[12]  Robert Szewczyk,et al.  System architecture directions for networked sensors , 2000, ASPLOS IX.

[13]  Anastasios A. Economides,et al.  Wireless sensor network security visualization , 2012, 2012 IV International Congress on Ultra Modern Telecommunications and Control Systems.

[14]  Xiaojiang Du,et al.  Security in wireless sensor networks , 2008, IEEE Wireless Communications.

[15]  Said E. El-Khamy,et al.  New low complexity key exchange and encryption protocols for wireless sensor networks clusters based on Elliptic Curve Cryptography , 2009, 2009 National Radio Science Conference.

[16]  Jian Wang,et al.  Key Sharing in Hierarchical Wireless Sensor Networks , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[17]  G. Varaprasad,et al.  Dynamic key management method for wireless sensor networks , 2012, 2012 Ninth International Conference on Wireless and Optical Communications Networks (WOCN).

[18]  Srinivas Sampalli,et al.  A Hybrid Key Management Protocol for Wireless Sensor Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[19]  Honggang Wang,et al.  Scaling Laws of Key Predistribution Protocols in Wireless Sensor Networks , 2011, IEEE Transactions on Information Forensics and Security.

[20]  Mohsen Guizani,et al.  Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.

[21]  Yang Yang,et al.  A novel key management scheme for hierarchical wireless sensor networks , 2010, 2010 IEEE 12th International Conference on Communication Technology.

[22]  Esam A. A. A. Hagras,et al.  Energy efficient key management scheme based on elliptic curve signcryption for Wireless Sensor Networks , 2011, 2011 28th National Radio Science Conference (NRSC).

[23]  Stephan Olariu,et al.  Group key management scheme for large-scale sensor networks , 2005, Ad Hoc Networks.

[24]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, ACM Trans. Inf. Syst. Secur..

[25]  Donggang Liu,et al.  Improving key predistribution with deployment knowledge in static sensor networks , 2005, TOSN.

[26]  Srinivas Sampalli,et al.  A robust pair-wise and group key management protocol for wireless sensor network , 2010, 2010 IEEE Globecom Workshops.

[27]  Dong-Jo Park,et al.  Security-enhanced key establishment schemes using network coding , 2012, 2012 7th International Conference on Computing and Convergence Technology (ICCCT).

[28]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[29]  Kanwalinderjit Kaur Gagneja Pairwise post deployment key management scheme for heterogeneous sensor networks , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[30]  Chen Liqing,et al.  A New Key Management Protocol for Wireless Sensor Network , 2012, 2012 International Conference on Computer Science and Service System.

[31]  Wenqi Yu A Promising Pairwise Key Establishment Scheme for Wireless Sensor Networks in Hostile Environments , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[32]  Yun Pan,et al.  Simulation of Key Management Protocol in Wireless Sensor Networks , 2009, 2009 International Joint Conference on Computational Sciences and Optimization.

[33]  Hung-Min Sun,et al.  A Pair-wise Key Establishment for Wireless Sensor Networks , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[34]  Javier López,et al.  Unleashing public-key cryptography in wireless sensor networks , 2006, J. Comput. Secur..

[35]  Wenjing Lou,et al.  Secure and Fault-Tolerant Event Boundary Detection in Wireless Sensor Networks , 2008, IEEE Transactions on Wireless Communications.