Secure Hybrid Group Key Management for Hierarchical Self-Organizing Sensor Network

Key management is deemed as the fundamental essential part of any secure communication. A secure sensor network communication protocol relies on the substantial secure, robust and efficient key management system. We put forward a new hybrid group key management scheme for hierarchical self organizing wireless sensor network architecture. By using this approach, multi-level security can be achieved to secure groups of sensors at different levels. We place the cryptographic burden where the resources are less constrained, at the forwarding nodes and the access points. In our proposed scheme, access points and forwarding nodes initially perform a key agreement protocol and each sensor node in a cluster later on establishes a group key with the forwarding node using a key transport scheme dynamically after deployment.

[1]  Bartosz Zoltak Tail-MAC: An Efficient Message Authentication Scheme for Stream Ciphers , 2004 .

[2]  Sushil Jajodia,et al.  LEAP - efficient security mechanisms for large-scale distributed sensor networks , 2003, SenSys.

[3]  Dipankar Raychaudhuri,et al.  Architecture and prototyping of an 802.11-based self-organizing hierarchical ad-hoc wireless network (SOHAN) , 2004, 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754).

[4]  Peter Kruus,et al.  CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .

[5]  Yau-Hwang Kuo,et al.  The new intrusion prevention and detection approaches for clustering-based sensor networks [wireless sensor networks] , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[6]  Qiang Huang,et al.  Fast authenticated key establishment protocols for self-organizing sensor networks , 2003, WSNA '03.

[7]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[8]  Yvo Desmedt,et al.  A secure and scalable Group Key Exchange system , 2005, Inf. Process. Lett..

[9]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[10]  Jianying Zhou,et al.  Applying intrusion detection systems to wireless sensor networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[11]  Kang G. Shin,et al.  LiSP: A lightweight security protocol for wireless sensor networks , 2004, TECS.

[12]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[13]  Mohamed F. Younis,et al.  A low-energy key management protocol for wireless sensor networks , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.

[14]  Kenneth G. Paterson,et al.  Deniable Authenticated Key Establishment for Internet Protocols , 2003, Security Protocols Workshop.

[15]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[16]  Dipankar Raychaudhuri,et al.  Routing protocols for self-organizing hierarchical ad-hoc wireless networks , 2003 .

[17]  Yvo Desmedt,et al.  A Secure and Efficient Conference Key Distribution System (Extended Abstract) , 1994, EUROCRYPT.

[18]  Lei Xie,et al.  A Tamper-resistance Key Pre-distribution Scheme for Wireless Sensor Networks , 2006, 2006 Fifth International Conference on Grid and Cooperative Computing Workshops.

[19]  Peng Ning,et al.  An efficient scheme for authenticating public keys in sensor networks , 2005, MobiHoc '05.