Evolutionary Computation Guided Energy Efficient Key Organization in Wireless Communication (ECEEKO)

In this paper an Evolutionary Computation based energy efficient novel key organization (ECEEKO) policy has been proposed by incorporating computational safety, power management and restricted usage of memory in wireless communication. Generating functions of secured key are generated from the sink node through evolutionary computation and distribute to the header and sensor nodes. On agreeable particular power consumption constraints each potential key generating function (KGF) is encoded as a chromosome. Using entropy measure fitness is calculated to assess key distribution. Common keys are assembling by headers and sensor nodes. Performance analysis of the ECEEKO approach and comparison study with several existing methods has been done.

[1]  Frank Stajano,et al.  The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.

[2]  Zheng Huang,et al.  A novel dynamic key management scheme for wireless sensor networks , 2011, 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology.

[3]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[4]  Hua Yang,et al.  A hybrid key management scheme for Heterogeneous wireless sensor networks based on ECC and trivariate symmetric polynomial , 2011, 2011 International Conference on Uncertainty Reasoning and Knowledge Engineering.

[5]  E. Jaynes Information Theory and Statistical Mechanics , 1957 .

[6]  André Weimerskirch,et al.  A Distributed Light-Weight Authentication Model for Ad-hoc Networks , 2001, ICISC.

[7]  Bülent Yener,et al.  Key distribution mechanisms for wireless sensor networks : a survey , 2005 .

[8]  Goldberg,et al.  Genetic algorithms , 1993, Robust Control Systems with Genetic Algorithms.

[9]  Francisco Herrera,et al.  Fuzzy connectives based crossover operators to model genetic algorithms population diversity , 1997, Fuzzy Sets Syst..

[10]  M. Ramkumar,et al.  On the security of random key pre-distribution schemes , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..

[11]  Mohamed Eltoweissy,et al.  A study of static versus dynamic keying schemes in sensor networks , 2005, PE-WASUN '05.

[12]  Haiyun Luo,et al.  Adaptive security for multilevel ad hoc networks , 2002, Wirel. Commun. Mob. Comput..

[13]  Tzung-Pei Hong,et al.  A GA-BASED KEY-MANAGEMENT SCHEME IN HIERARCHICAL WIRELESS SENSOR NETWORKS , 2009 .

[14]  Minoru Ito,et al.  Localization of a Moving Sensor by Particle Filters , 2007 .

[15]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.

[16]  Xiaozhou Li,et al.  Reliable group rekeying: a performance analysis , 2001, SIGCOMM '01.

[17]  Candelaria Hernández-Goya,et al.  Self-organized authentication architecture for Mobile Ad-hoc Networks , 2008, 2008 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops.

[18]  Yunghsiang Sam Han,et al.  A key predistribution scheme for sensor networks using deployment knowledge , 2006, IEEE Transactions on Dependable and Secure Computing.

[19]  David E. Goldberg,et al.  Genetic Algorithms in Search Optimization and Machine Learning , 1988 .

[20]  Mahalingam Ramkumar,et al.  Pre-loaded key based multicast and broadcast authentication in mobile ad-hoc networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[21]  A. Price,et al.  A key pre-distribution scheme for wireless sensor networks , 2005, Symposium, 2005 Wireless Telecommunications.

[22]  D. E. Goldberg,et al.  Genetic Algorithms in Search , 1989 .

[23]  Goo Yeon Lee,et al.  Efficient rekey interval for minimum cost on secure multicast system using group key , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.

[24]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..