A collusion-resistant dynamic key management scheme for WSNs

Key management is an important security service for protecting wireless sensor networks (WSNs). Among various existing schemes, exclusion basis system (EBS) is a practical solution that can be easily implemented to provide long-term and flexible protection for WSNs. The involved rekeying strategy in EBS can efficiently evict the compromised node and update the key system. However, the relatively small key pool leads to high correlation among the generated key rings. Consequently, it is almost impossible for EBS-based schemes to efficiently defend collusion attack with their rekeying mechanisms. In this paper, we first analyze the impact of collusion attack on WSNs, especially that in the case where the keys of the compromised nodes can form a connected graph. Then, we propose a novel key management scheme based on EBS. The proposed scheme is termed as t-EEBS because it can effectively resist the referred collusion attack formed by t(t > 1) nodes. Furthermore, we assume that the proposed scheme is implemented in hierarchical WSNs. In this case, two layers of t-EEBS administrative keys are used. The upper layer is implemented among the base station and all cluster leaders, while the lower layer involves a t-EEBS for each cluster. The results of performance evaluation show that the proposed scheme has better resistance to collusion attack than other schemes. Therefore, the proposed scheme can provide better security service for WSNs. Copyright © 2017 John Wiley & Sons, Ltd.

[1]  Shu Guo Cao,et al.  A Lightweight of Cluster-Based Key Management Scheme for Wireless Sensor Networks , 2013 .

[2]  H. T. Mouftah,et al.  WSN Architectures for Intelligent Transportation Systems , 2009, 2009 3rd International Conference on New Technologies, Mobility and Security.

[3]  Yacine Challal,et al.  A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks , 2013, IEEE Transactions on Wireless Communications.

[4]  Ivan Stojmenovic,et al.  Pairwise and Triple Key Distribution in Wireless Sensor Networks with Applications , 2013, IEEE Transactions on Computers.

[5]  V. Milutinovic,et al.  A survey of military applications of wireless sensor networks , 2012, 2012 Mediterranean Conference on Embedded Computing (MECO).

[6]  Y. M. Huang,et al.  Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks , 2009, IEEE Journal on Selected Areas in Communications.

[7]  Ivan Stojmenovic,et al.  Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs , 2011, 2011 Proceedings IEEE INFOCOM.

[8]  M. Ismail,et al.  Evaluation of optimal cluster size in heterogenous energy wireless sensor networks , 2012, 2012 International Symposium on Telecommunication Technologies.

[9]  H. T. Mouftah,et al.  Dynamic Combinatorial Key Pre-distribution Scheme for Heterogeneous Sensor Networks , 2011, STA.

[10]  Xiao Fen Yu,et al.  Hardware Design of an Environmental Monitoring System Based on Wireless Sensor Networks , 2013 .

[11]  Vijay Varadharajan,et al.  Wireless sensor network key management survey and taxonomy , 2010, J. Netw. Comput. Appl..

[12]  Anandarup Mukherjee,et al.  Design and implementation analysis of a public key infrastructure-enabled security framework for ZigBee sensor networks , 2016, Int. J. Commun. Syst..

[13]  Bülent Yener,et al.  Combinatorial design of key distribution mechanisms for wireless sensor networks , 2007, TNET.

[14]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[15]  Mohamed F. Younis,et al.  Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks , 2006, IEEE Transactions on Parallel and Distributed Systems.

[16]  Wendi Heinzelman,et al.  Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[17]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[18]  Mohamed Eltoweissy,et al.  Combinatorial Optimization of Group Key Management , 2003, Journal of Network and Systems Management.

[19]  Mohamed Eltoweissy,et al.  Dynamic key management in sensor networks , 2006, IEEE Communications Magazine.

[20]  Jun Luo,et al.  LEP: A lightweight key management scheme based on ebs and polynomial for wireless sensor networks , 2011, 2011 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC).

[21]  Ding-Zhu Du,et al.  New constructions on broadcast encryption key pre-distribution schemes , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[22]  Mohammad S. Obaidat,et al.  A PKI Adapted Model for Secure Information Dissemination in Industrial Control and Automation 6LoWPANs , 2015, IEEE Access.