Large scale wireless sensor networks with multi-level dynamic key management scheme

Cyber-Physical Systems (CPSs) have emerged as a promising approach to facilitate the integration of the cyber and physical worlds in highly interconnected and complex ways. CPSs consist of several components, such as sensors, actuators, controllers, etc., and their structures are being complicated, and their scales are increasing day by day. Therefore, the data reliability and security have emerged as critical challenges between physical and virtual components of these systems. Wireless Sensor Networks (WSNs) are accepted as one of the most crucial technologies for building future CPSs. Because of their wireless and dynamic nature, WSNs are more vulnerable to security attacks than wired networks. The main solution for this problem is the usage of signed messages with symmetric or asymmetric key cryptography. Although, asymmetric key cryptography increases network security, it also causes severe computational, memory, and energy overhead for sensor nodes. On the other hand, symmetric key cryptography has the difficulty of providing high-level security and efficient key management scheme; however, it is better in terms of speed and low energy cost. In this paper, it is aimed to build a multi-level dynamic key management system for WSNs with the aid of an Unmanned Aerial Vehicle (UAV), which is a key distribution and coordination center for asymmetric keys. After that, each sensor node constructs different symmetric keys with its neighbors, and communication security is achieved by data encryption and mutual authentication with these keys. Evaluation results show the proposed system is scalable, and its performance is significantly better than asymmetric key management systems.

[1]  Vipul Gupta,et al.  Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[2]  Hermann de Meer,et al.  Dynamic key management in wireless sensor networks: A survey , 2013, J. Netw. Comput. Appl..

[3]  Sang Ho Lee,et al.  Secure Key Management Protocol in the Wireless Sensor Network , 2006, J. Inf. Process. Syst..

[4]  E. Munivel,et al.  Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks , 2010, 2010 International Conference on Wireless Communication and Sensor Computing (ICWCSC).

[5]  David Boyle,et al.  On the implementation and evaluation of an elliptic curve based cryptosystem for Java enabled Wireless Sensor Networks , 2009 .

[6]  Ozgur Koray Sahingoz,et al.  Agent-Based Fault Tolerant Distributed Event System , 2007, Comput. Informatics.

[7]  Kakali Chatterjee,et al.  Performance Study of genus 3 Hyperelliptic Curve Cryptosystem , 2012, J. Inf. Process. Syst..

[8]  Ilker Bekmezci,et al.  Flying Ad-Hoc Networks (FANETs): A survey , 2013, Ad Hoc Networks.

[9]  Liu Hui,et al.  A secure key management protocol for wireless sensor networks , 2010, 2010 International Conference on Education and Management Technology.

[10]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[11]  Wenjing Lou,et al.  Multi-User Broadcast Authentication in Wireless Sensor Networks , 2009 .

[12]  Panganamala Ramana Kumar,et al.  Cyber–Physical Systems: A Perspective at the Centennial , 2012, Proceedings of the IEEE.

[13]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[14]  Ozgur Koray Sahingoz Multi-Level Dynamic Key Management for Scalable Wireless Sensor Networks with UAV , 2013 .

[15]  Paulo S. L. M. Barreto,et al.  A survey on key management mechanisms for distributed Wireless Sensor Networks , 2010, Comput. Networks.

[16]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[17]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[18]  Vijay Varadharajan,et al.  Wireless sensor network key management survey and taxonomy , 2010, J. Netw. Comput. Appl..