Efficient Group Key Management using Symmetric Key and Threshold Cryptography for Cluster based Wireless Sensor Networks

Research in Wireless Sensor Networks (WSNs) has made a significant progress recently, especially the area of key management, which plays a central role for protecting group communication in sensor networks. In sensor networks, the data are crucial and have to keep secrecy in data communication. To achieve data confidentiality, adversary should not have access to the group communication. Therefore due to the limited memory resources and energy constraints of sensor nodes, reducing the communication and storage overhead, and improving the resilience against the node capture attack become a must. In this paper we propose An Efficient Group Key Management using Symmetric Key and Threshold Cryptography for Cluster based Wireless Sensor Networks (EGKMST). The proposed scheme considers a hierarchical cluster structure of sensor network and adopts the pair-wise key management and group key management based on threshold key cryptography to generate and to distribute the keys efficiently within a cluster and updates periodically keys. By this way EGKMST provides continuous transmission security and avoids dangerous attacks from malicious nodes and mitigate the node compromise attack in WSNs communication. The security and performance analysis illustrate that EGKMST scheme achieves the requirement of group communication and provides efficient security with low communication cost, low memory overhead and energy saving compared with some existing key management schemes.

[1]  Donggang Liu,et al.  Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks , 2002, NDSS.

[2]  Qin Wang,et al.  An Improved Key Management Scheme for Hierarchical Wireless Sensors Networks , 2014 .

[3]  Sanjay Kumar Madria,et al.  A secure hierarchical model for sensor network , 2004, SGMD.

[4]  Jianwei Huang,et al.  Re-examining Probabilistic Versus Deterministic Key Management , 2007, 2007 IEEE International Symposium on Information Theory.

[5]  Paulo S. L. M. Barreto,et al.  A survey on key management mechanisms for distributed Wireless Sensor Networks , 2010, Comput. Networks.

[6]  Prasan Kumar Sahoo,et al.  Efficient security mechanisms for the distributed wireless sensor networks , 2005, Third International Conference on Information Technology and Applications (ICITA'05).

[7]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[8]  Sajid Hussain,et al.  An Authenticated Key Management Scheme for Hierarchical Wireless Sensor Networks , 2008 .

[9]  Gang Hu,et al.  Research and Improve on Secure Routing Protocols in Wireless Sensor Networks , 2008, 2008 4th IEEE International Conference on Circuits and Systems for Communications.

[10]  Parminder Singh,et al.  An Efficient Novel Key Management Scheme for Enhancing User Authentication in A WSN , 2013 .

[11]  Ricardo Dahab,et al.  SecLEACH - On the security of clustered sensor networks , 2007, Signal Process..

[12]  I. Mahgoub,et al.  A Secure Hierarchical Routing Protocol for Wireless Sensor Networks , 2006, 2006 10th IEEE Singapore International Conference on Communication Systems.

[13]  Chee-Onn Chow,et al.  A Novel Secure Key Management Module for Hierarchical Clustering Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.

[14]  Vijay Varadharajan,et al.  A New Security Scheme for Wireless Sensor Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[15]  Yue Qi,et al.  A Novel Key Management Scheme for Cluster Based Wireless Sensors Networks , 2013 .

[16]  Soumendra Nath Lahiri,et al.  Security and performance analysis of a secure clustering protocol for sensor networks , 2007, Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007).

[17]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[18]  Othman Ibrahim,et al.  Empirical Study on Secure Routing Protocols in Wireless Sensor Networks , 2010, Int. J. Adv. Comp. Techn..

[19]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[20]  Baojiang Cui,et al.  A Secure Hierarchical Key Management Scheme in Wireless Sensor Network , 2012, Int. J. Distributed Sens. Networks.

[21]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[22]  Yuan Zhang,et al.  A Cluster-Based Group Key Management Scheme for Wireless Sensor Networks , 2010, 2010 12th International Asia-Pacific Web Conference.

[23]  Cong Wang,et al.  A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[24]  Yue Qi,et al.  Efficient Hierarchical Routing Protocols in Wireless Sensor Networks Routing Protocols in Wireless Sensor Networks Routing Protocols in Wireless Sensor Networks Routing Protocols in Wireless Sensor Networks , 2013 .

[25]  T. Lalitha,et al.  Energy Efficient Cluster Based key Management Technique for Wireless Sensor Networks , 2011 .

[26]  Lein Harn,et al.  Authenticated Group Key Transfer Protocol Based on Secret Sharing , 2010, IEEE Transactions on Computers.

[27]  Antonio Alfredo Ferreira Loureiro,et al.  On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks , 2005, ICN.

[28]  Sajal K. Das,et al.  Group key distribution via local collaboration in wireless sensor networks , 2005, 2005 Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON 2005..

[29]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[30]  Sanjay Kumar Madria,et al.  SecRout: a secure routing protocol for sensor networks , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).

[31]  Yue Qi,et al.  An Advanced Survey on Secure Energy-Efficient Hierarchical Routing Protocols in Wireless Sensor Networks , 2013, ArXiv.

[32]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[33]  Yiying Zhang,et al.  A Secret Sharing-Based Key Management in Hierarchical Wireless Sensor Network , 2013, Int. J. Distributed Sens. Networks.

[34]  Vijay Varadharajan,et al.  Wireless sensor network key management survey and taxonomy , 2010, J. Netw. Comput. Appl..

[35]  Yang Yang,et al.  A novel key management scheme for hierarchical wireless sensor networks , 2010, 2010 IEEE 12th International Conference on Communication Technology.

[36]  Huda B. Hubboub,et al.  Reinforcement Swap Attack against Directed Diffusion in Wireless Sensor Networks , 2012 .

[37]  Dharma P. Agrawal,et al.  An improved key distribution mechanism for large-scale hierarchical wireless sensor networks , 2007, Ad Hoc Networks.