Alternative Shared Key Replacement in Heterogeneous Wireless Sensor Networks

Key management is considered as the fundamental part of any secure communication. In previous work, we propose RKPH scheme that was improved based on connectivity and resiliency compared to some other schemes. In this paper, we propose ARKPH, a modified scheme of RKPH that decrease impact of node compromise on sensor network security. In this scheme that we name it as alternative shared key replacement, impact of existence of multiple shared key between two nodes is studied. In RKPH, with compromising a secure link, link expire and secure connection between two neighboring node terminate. Expiring secure connections cause that connectivity in network decrease. For decreasing effect of compromising a node on expiring secure connections, we discover another shared key between two nodes that have not compromised yet. This work is done directly or indirectly by cluster head. Simulation results show that expiring secure connections in ARKPH scheme is decreased.

[1]  Firdous Kausar,et al.  An efficient key distribution scheme for heterogeneous sensor networks , 2007, IWCMC.

[2]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[3]  Thomas F. La Porta,et al.  Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks , 2007, IEEE Trans. Mob. Comput..

[4]  Rolf Blom,et al.  Non-Public Key Distribution , 1982, CRYPTO.

[5]  Mohsen Guizani,et al.  An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.

[6]  Yuguang Fang,et al.  Securing sensor networks with location-based keys , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[7]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1998, Inf. Comput..

[8]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[9]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[10]  Sushil Jajodia,et al.  LEAP - efficient security mechanisms for large-scale distributed sensor networks , 2003, SenSys.

[11]  Omar Cheikhrouhou,et al.  Establishing Pairwise Keys in Heterogeneous Two-Tiered Wireless Sensor Networks , 2009, 2009 Third International Conference on Sensor Technologies and Applications.

[12]  Thomas F. La Porta,et al.  Establishing Pair-Wise Keys in Heterogeneous Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[13]  Donggang Liu,et al.  Location-based pairwise key establishments for static sensor networks , 2003, SASN '03.

[14]  Jiankun Hu,et al.  A framework for a distributed key management scheme in heterogeneous wireless sensor networks , 2008, IEEE Transactions on Wireless Communications.

[15]  Adrian Perrig,et al.  PIKE: peer intermediaries for key establishment in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[16]  Saber Banihashemian,et al.  A new key management scheme in heterogeneous wireless sensor networks , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).

[17]  Brian D. O. Anderson,et al.  Wireless sensor network localization techniques , 2007, Comput. Networks.