A Novel Secure Key Management Module for Hierarchical Clustering Wireless Sensor Networks

Secure key management is crucial to meet the security goals to prevent the Wireless Sensor Networks (WSNs) being compromised by an adversary. Owing to ad-hoc nature and resource limitations of sensor networks, provisioning a right key management is challenging. In this paper we present a Novel Secure Key Management (NSKM) module providing an efficient scalable post-distribution key establishment that allows the hierarchical clustering topology platform to provision acceptable security services. To the best of our knowledge this module is the first implemented security module for wireless sensor networks that provisions reasonable resistance against replay and node capture attacks. Furthermore, it provides highly lightweight and scalable scheme. Also it is acceptable to be used in a wireless sensor network of thousands of sensor nodes.

[1]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[2]  A. Zomaya,et al.  A security framework for wireless sensor networks , 2006, Proceedings of the 2006 IEEE Sensors Applications Symposium, 2006..

[3]  Hiroshi Ishii,et al.  Threat Models and Security Issues in Wireless Sensor Networks , 2010 .

[4]  A. S. Poornima,et al.  Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks , 2009 .

[5]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[6]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[7]  Mohsen Guizani,et al.  An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.

[8]  M. Luk,et al.  MiniSec: A Secure Sensor Network Communication Architecture , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[9]  Tassos Dimitriou,et al.  Providing Transparent Security Services to Sensor Networks , 2007, 2007 IEEE International Conference on Communications.

[10]  Kalpana Sharma,et al.  Security Model for Hierarchical Clustered Wireless Sensor Networks , 2011 .

[11]  Yunghsiang Sam Han,et al.  A key predistribution scheme for sensor networks using deployment knowledge , 2006, IEEE Transactions on Dependable and Secure Computing.

[12]  Kameswari Chebrolu,et al.  Censor networks: a critique of "sensor networks" from a systems perspective , 2008, CCRV.

[13]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[14]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.

[15]  Kalpana Sharma,et al.  Complete Security Framework for Wireless Sensor Networks , 2009, ArXiv.

[16]  David Boyle,et al.  Securing Wireless Sensor Networks: Security Architectures , 2008, J. Networks.

[17]  Albert Y. Zomaya,et al.  A Secure Triple-Key Management Scheme for Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[18]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, ACM Trans. Inf. Syst. Secur..

[19]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[20]  Ayman Khalil,et al.  Cross-Layer Resource Allocation Scheme Under Heterogeneous Constraints for Next Generation High Rate WPAN , 2010, ArXiv.

[21]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[22]  Kalpana Sharma,et al.  Cross Layer Security Framework for Wireless Sensor Networks , 2011 .