A*-based key tree structure generation for group key management in wireless sensor networks

The application of wireless sensor networks to areas such as combat field surveillance, terrorist tracking and highway traffic monitoring requires secure communication among the sensor nodes within the networks. Logical key hierarchy (LKH) is a tree-based key management model which provides secure group communication. When a sensor node is added or evicted from the communication group, LKH updates the group key in order to ensure the security of the communications. In order to efficiently update the group key, we propose an A^*-based key tree structure, an extension to LKH, that reduces the number of re-key messages by considering the addition and eviction ratios of the history data. For the generation of the proposed key tree structure the A^* algorithm is applied, in which the branching factor at each level can take on different value. The experimental results demonstrate the efficiency of the proposed key tree structure against the existing key tree structures of fixed branching factors.

[1]  Yau-Hwang Kuo,et al.  The new intrusion prevention and detection approaches for clustering-based sensor networks [wireless sensor networks] , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[2]  Mohamed F. Younis,et al.  Energy-aware routing in cluster-based sensor networks , 2002, Proceedings. 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems.

[3]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[4]  Mohamed F. Younis,et al.  Lightweight key management for wireless sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[5]  Nils J. Nilsson,et al.  Artificial Intelligence: A New Synthesis , 1997 .

[6]  Sushil Jajodia,et al.  Providing secrecy in key management protocols for large wireless sensors networks , 2003, Ad Hoc Networks.

[7]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[8]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[9]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[10]  Gang Qu,et al.  Design space exploration for energy-efficient secure sensor network , 2002, Proceedings IEEE International Conference on Application- Specific Systems, Architectures, and Processors.

[11]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[12]  Mario Gerla,et al.  Adaptive Clustering for Mobile Wireless Networks , 1997, IEEE J. Sel. Areas Commun..

[13]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[14]  Peter Kruus,et al.  CONSTRAINTS AND APPROACHES FOR DISTRIBUTED SENSOR NETWORK SECURITY , 2000 .

[15]  Prasan Kumar Sahoo,et al.  Efficient security mechanisms for the distributed wireless sensor networks , 2005, Third International Conference on Information Technology and Applications (ICITA'05).

[16]  JAMAL N. AL-KARAKI,et al.  Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.

[17]  Stephan Olariu,et al.  Group key management scheme for large-scale sensor networks , 2005, Ad Hoc Networks.

[18]  D. Manivannan,et al.  Routing protocols for sensor networks , 2004, First IEEE Consumer Communications and Networking Conference, 2004. CCNC 2004..

[19]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[20]  Gregory J. Pottie,et al.  Wireless integrated network sensors , 2000, Commun. ACM.

[21]  Eric J. Harder,et al.  Key Management for Multicast: Issues and Architectures , 1999, RFC.

[22]  Roberto Di Pietro,et al.  LKHW: a directed diffusion-based secure multicast scheme for wireless sensor networks , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[23]  Samir Chatterjee,et al.  A Secure Key Management Scheme for Sensor Networks , 2004, AMCIS.

[24]  Mohamed F. Younis,et al.  A low-energy key management protocol for wireless sensor networks , 2003, Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003.