Cluster based secure dynamic keying technique for heterogeneous mobile Wireless Sensor Networks

In Heterogeneous Wireless Sensor Networks, the mobility of the sensor nodes becomes essential in various applications. During node mobility, there are possibilities for the malicious node to become the cluster head or cluster member. This causes the cluster or the whole network to be controlled by the malicious nodes. To offer high level of security, the mobile sensor nodes need to be authenticated. Further, clustering of nodes improves scalability, energy efficient routing and data delivery. In this paper, we propose a cluster based secure dynamic keying technique to authenticate the nodes during mobility. The nodes with high configuration are chosen as cluster heads based on the weight value which is estimated using parameters such as the node degree, average distance, node's average speed, and virtual battery power. The keys are dynamically generated and used for providing security. Even the keys are compromised by the attackers, they are not able to use the previous keys to cheat or disuse the authenticated nodes. In addition, a bidirectional malicious node detection technique is employed which eliminates the malicious node from the network. By simulation, it is proved that the proposed technique provides efficient security with reduced energy consumption during node mobility.

[1]  K. Pradeepa,et al.  Design and Implementation Issues of Clustering in Wireless Sensor Networks , 2012 .

[2]  Kirusnapillai Selvarajah,et al.  Heterogeneous Wireless Sensor Network for Transportation System Applications , 2011 .

[3]  Joonsang Baek,et al.  Authentication and Key Establishment in Dynamic Wireless Sensor Networks , 2010, Sensors.

[4]  Chen Zhigang,et al.  A Secure Routing Protocol with Intrusion Detection for Clustering Wireless Sensor Networks , 2010, 2010 International Forum on Information Technology and Applications.

[5]  DAVID W. CARMAN,et al.  New Directions in Sensor Network Key Management , 2005, Int. J. Distributed Sens. Networks.

[6]  Andrei V. Gurtov,et al.  An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications , 2014, Sensors.

[7]  Ozgur Koray Sahingoz,et al.  Large scale wireless sensor networks with multi-level dynamic key management scheme , 2013, J. Syst. Archit..

[8]  Ossama Younis,et al.  HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.

[9]  Dharma P. Agrawal,et al.  An improved key distribution mechanism for large-scale hierarchical wireless sensor networks , 2007, Ad Hoc Networks.

[10]  Yookun Cho,et al.  PEACH: Power-efficient and adaptive clustering hierarchy protocol for wireless sensor networks , 2007, Comput. Commun..

[11]  Fei Hu,et al.  Scalable Security in Wireless Sensor and Actuator Networks ( WSANs ) , 2005 .

[12]  Cong Wang,et al.  A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[13]  Sudhakar Radhakrishnan,et al.  Cluster Based Dynamic Keying Technique for Authentication in Wireless Sensor Networks , 2012, IAIT 2012.

[14]  H. Hassanein,et al.  Stochastic modeling of distributed,dynamic,randomized clustering protocols for wireless sensor networks , 2004, Workshops on Mobile and Wireless Networking/High Performance Scientific, Engineering Computing/Network Design and Architecture/Optical Networks Control and Management/Ad Hoc and Sensor Networks/Compil.

[15]  Maybin K. Muyeba,et al.  Security issues in ambulatory wireless sensor networks (AWSN): security Vs mobility , 2009 .

[16]  Stephan Olariu,et al.  Scalable cryptographic key management in wireless sensor networks , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..

[17]  Dharma P. Agrawal,et al.  Intrusion Detection in Homogeneous and Heterogeneous Wireless Sensor Networks , 2008, IEEE Transactions on Mobile Computing.

[18]  Tzung-Pei Hong,et al.  An Improved Weighted Clustering Algorithm for Determination of Application Nodes in Heterogeneous Sensor Networks , 2011, J. Inf. Hiding Multim. Signal Process..

[19]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[20]  Shu Yun Lim,et al.  Energy-Efficient and Scalable Group Key Management for Hierarchical Sensor Network , 2011, J. Ubiquitous Syst. Pervasive Networks.

[21]  Jin-Hee Cho,et al.  Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.

[22]  Song Mao,et al.  Unequal clustering algorithm for WSN based on fuzzy logic and improved ACO , 2011 .

[23]  Berk Sunar,et al.  State of the art in ultra-low power public key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[24]  Georgios Kambourakis,et al.  A Survey on Cluster-Based Group Key Agreement Protocols for WSNs , 2011, IEEE Communications Surveys & Tutorials.

[25]  Özgür Erçetin,et al.  On Security and Reliability Using Cooperative Transmissions in Sensor Networks , 2010, Mobile Networks and Applications.

[26]  Rico Radeke,et al.  Node Degree based Improved Hop Count Weighted Centroid Localization Algorithm , 2011, KiVS.

[27]  Kuochen Wang,et al.  Efficient localization in mobile wireless sensor networks , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).

[28]  Mayank Singh,et al.  Clustering Based on Node Density in Heterogeneous Under-Water Sensor Network , 2013 .

[29]  Willy Susilo,et al.  Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security , 2006, IACR Cryptol. ePrint Arch..

[30]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[31]  Huifang Chen,et al.  One-way hash chain-based self-healing group key distribution scheme with collusion resistance capability in wireless sensor networks , 2013, Ad Hoc Networks.

[32]  WangShun-Sheng,et al.  An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks , 2011 .

[33]  Jang-Won Lee,et al.  An average velocity-based routing protocol with low end-to-end delay for wireless sensor networks , 2009, IEEE Communications Letters.

[34]  M. Kumar,et al.  Security issues in wireless sensor networks , 2017 .

[35]  Thomas F. La Porta,et al.  Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks , 2007, IEEE Trans. Mob. Comput..

[36]  Ricardo Dahab,et al.  SecLEACH - On the security of clustered sensor networks , 2007, Signal Process..

[37]  Joonsang Baek,et al.  Efficient online/offline identity-based signature for wireless sensor network , 2010, International Journal of Information Security.

[38]  Ivan Stojmenovic,et al.  Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs , 2011, 2011 Proceedings IEEE INFOCOM.

[39]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[40]  Xuemin Shen,et al.  Self-healing group key distribution with time-limited node revocation for wireless sensor networks , 2007, Ad hoc networks.

[41]  Stephan Olariu,et al.  Group key management scheme for large-scale sensor networks , 2005, Ad Hoc Networks.

[42]  Yong Wang,et al.  A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.

[43]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[44]  Dusit Niyato,et al.  Remote patient monitoring service using heterogeneous wireless access networks: architecture and optimization , 2009, IEEE Journal on Selected Areas in Communications.

[45]  Soumendra Nath Lahiri,et al.  Security and performance analysis of a secure clustering protocol for sensor networks , 2007, Sixth IEEE International Symposium on Network Computing and Applications (NCA 2007).

[46]  Dharma P. Agrawal,et al.  An Analytical Model for Information Retrieval in Wireless Sensor Networks Using Enhanced APTEEN Protocol , 2002, IEEE Trans. Parallel Distributed Syst..

[47]  Raheem A. Beyah,et al.  VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[48]  Sriram Chellappan,et al.  Providing End-to-End Secure Communications in Wireless Sensor Networks , 2011, IEEE Transactions on Network and Service Management.

[49]  R. B. Patel,et al.  EEHC: Energy efficient heterogeneous clustered scheme for wireless sensor networks , 2009, Comput. Commun..

[50]  Takahiro Hara,et al.  Wireless Sensor Network Technologies for the Information Explosion Era , 2012, Wireless Sensor Network Technologies for the Information Explosion Era.