A Secured Dynamic Cluster-Based Wireless Sensor Network

Driven by the technology advances in Micro-Electro-Mechanical Systems which has facilitated the development of smart sensors; we have witnessed in recent years the emergence of WSNs in environment, military, surveillance, natural disaster relief, healthcare, etc. These WSNs carry the promise of drastically improving and expanding the quality of services across a wide variety of settings and for different segments of the population. Therefore, it is very important to develop a WSN with robustness and security in mind. Typically, the sensors are smaller in sizes that have limited processing and computational power resources, and are inexpensive, thus enabling the network to have a large coverage area and longer range. By using hundreds or thousands of them it is possible to build a high quality, fault-tolerant sensor network where failure of one or few nodes does not affect the operation of the network. They are also self-configuring or self-organizing. In this paper, we propose formation of a Secured Cluster-based architecture for a Dynamic Wireless Sensor Network that uses two topology management operations: node-move-in and node-move-out. The proposed security protocol integrates one round Zero Knowledge Proof and AES algorithm to apply for node authentication, where only authenticated nodes will be accepted during node-move-in operation. We also show that it requires O(h+q) rounds for a node to join into a network securely, where h is the height of the dynamic cluster-based wireless sensor network and q is the number of neighbouring nodes of a joining node.

[1]  Maan Younis Abdullah,et al.  Cluster-Based Security for Wireless Sensor Networks , 2009, 2009 WRI International Conference on Communications and Mobile Computing.

[2]  I.I. Ibrahim,et al.  Efficient zero-knowledge identification scheme with secret key exchange , 2003, 2003 46th Midwest Symposium on Circuits and Systems.

[3]  Yoshiaki Katayama,et al.  Construction and Maintenance of a Novel Cluster-based Architecture for Ad Hoc Sensor Networks , 2008, Ad Hoc Sens. Wirel. Networks.

[4]  Xuehai Zhou,et al.  Distributed Node Authentication in Wireless Sensor Networks , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[5]  Dirk Fox,et al.  Advanced Encryption Standard (AES) , 1999, Datenschutz und Datensicherheit.

[6]  Nadia M. G. Al-Saidi,et al.  A new idea in zero knowledge protocols based on iterated function systems. , 2011 .

[7]  Cheng-Chi Lee,et al.  A novel user authentication and privacy preserving scheme with smart cards for wireless communications , 2012, Math. Comput. Model..

[8]  Sencun Zhu,et al.  Poster Abstract : LEAP – Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks , 2003 .

[9]  Edward F. Schaefer,et al.  A SIMPLIFIED AES ALGORITHM AND ITS LINEAR AND DIFFERENTIAL CRYPTANALYSES , 2003, Cryptologia.

[10]  Srivaths Ravi,et al.  Analyzing the energy consumption of security protocols , 2003, ISLPED '03.

[11]  Chen Wei,et al.  A better dynamic cluster-based structure of wireless sensor network for efficient routing , 2012 .

[12]  A. Jain,et al.  Security Solutions for Wireless Sensor Networks , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[13]  Andrea Vitaletti,et al.  Rijndael for Sensor Networks: Is Speed the Main Issue? , 2007, Electron. Notes Theor. Comput. Sci..

[14]  Clifford Neuman,et al.  Security and privacy using one-round zero-knowledge proofs , 2005, Seventh IEEE International Conference on E-Commerce Technology (CEC'05).

[15]  Kalpana Sharma,et al.  Security Model for Hierarchical Clustered Wireless Sensor Networks , 2011 .

[16]  Amir Shirkhodaie,et al.  Novel Broadcast/Multicast Protocols for Dynamic Sensor Networks , 2007, 2007 IEEE International Parallel and Distributed Processing Symposium.

[17]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[18]  David Boyle,et al.  Securing Wireless Sensor Networks: Security Architectures , 2008, J. Networks.

[19]  Lin SHEN,et al.  A Dynamic Cluster-based Key Management Protocol in Wireless Sensor Networks , .

[20]  I. Verbauwhede,et al.  Interfacing a high speed crypto accelerator to an embedded CPU , 2004, Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..

[21]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[22]  G. Gong,et al.  A Survey on Security in Wireless Sensor Networks , 2008 .

[23]  Antonio Alfredo Ferreira Loureiro,et al.  On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks , 2005, ICN.

[24]  Yong-Je Choi,et al.  Low Power Circuit Architecture of AES Crypto Module for Wireless Sensor Network , 2007 .

[25]  Sang Ho Lee,et al.  A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN , 2008, J. Digit. Content Technol. its Appl..