Authentication in Wireless Sensor Networks Using Dynamic Keying Technique

In this paper, Cluster Based Dynamic Keying Technique for Authentication in Wireless Sensor Networks (WSN) is proposed. The CH enabled by Global Positioning System (GPS) determines a Combined Cost Value (CCV) for each sensor node based on nodes location, node degree and virtual battery power. Since the key to the encryption scheme changes dynamically when there is change in CCV, separate dynamic keys are generated in each cluster by each CH and using RC5 encryption mechanism the source CH forwarding the data along different clusters along the path to the sink are able to verify the authenticity. When the source CH needs to transmit the aggregated data packet to the sink, it splits the packet into shares by threshold secret sharing algorithm and forwards them to the sink using multi-path dispersal routing technique.

[1]  Rajasekhar Mungara,et al.  A Routing-Driven Elliptic Curve Cryptography based Key Management Scheme for Heterogeneous Sensor Networks , 2014 .

[2]  Yun Wang Intrusion Detection in Gaussian Distributed Heterogeneous Wireless Sensor Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[3]  Joonsang Baek,et al.  An efficient and scalable re-authentication protocol over wireless sensor network , 2011, IEEE Transactions on Consumer Electronics.

[4]  Sudhakar Radhakrishnan,et al.  Cluster Based Dynamic Keying Technique for Authentication in Wireless Sensor Networks , 2012, IAIT 2012.

[5]  Junghyun Lee,et al.  Energy Efficient Key Management Protocol in Wireless Sensor Networks , 2010 .

[6]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[7]  Kirusnapillai Selvarajah,et al.  Heterogeneous Wireless Sensor Network for Transportation System Applications , 2011 .

[8]  Saber Banihashemian,et al.  A new key management scheme in heterogeneous wireless sensor networks , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).

[9]  Yong Guan,et al.  A Key Management Scheme Using Deployment Knowledge for Wireless Sensor Networks , 2008, IEEE Transactions on Parallel and Distributed Systems.

[10]  Chun-Shien Lu,et al.  Noninteractive Pairwise Key Establishment for Sensor Networks , 2010, IEEE Transactions on Information Forensics and Security.

[11]  Javier Bajo,et al.  Using Heterogeneous Wireless Sensor Networks in a Telemonitoring System for Healthcare , 2010, IEEE Transactions on Information Technology in Biomedicine.

[12]  Thomas Staub,et al.  MARWIS: A Management Architecture for Heterogeneous Wireless Sensor Networks , 2008, WWIC.

[13]  John A. Stankovic,et al.  Probability grid: a location estimation scheme for wireless sensor networks , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[14]  Vijay Varadharajan,et al.  A New Security Scheme for Wireless Sensor Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[15]  Meikang Qiu,et al.  Energy Minimization for Heterogeneous Wireless Sensor Network , 2006 .

[16]  Ivan Stojmenovic,et al.  Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs , 2011, 2011 Proceedings IEEE INFOCOM.

[17]  Jalel Ben-Othman,et al.  REER: Robust and Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[18]  Mohammed Feham,et al.  An Efficient Key Management Scheme for Hierarchical Wireless Sensor Networks , 2012 .

[19]  Young-Koo Lee,et al.  Simple hash based message authentication scheme for wireless sensor networks , 2009, 2009 9th International Symposium on Communications and Information Technology.

[20]  Yunghsiang Sam Han,et al.  A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.

[21]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[22]  Lan Tien Nguyen,et al.  An energy efficient routing scheme for mobile wireless sensor networks , 2008, 2008 IEEE International Symposium on Wireless Communication Systems.

[23]  Mohsen Guizani,et al.  Transactions papers a routing-driven Elliptic Curve Cryptography based key management scheme for Heterogeneous Sensor Networks , 2009, IEEE Transactions on Wireless Communications.

[24]  Raheem A. Beyah,et al.  VEBEK: Virtual Energy-Based Encryption and Keying for Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[25]  Sriram Chellappan,et al.  Providing End-to-End Secure Communications in Wireless Sensor Networks , 2011, IEEE Transactions on Network and Service Management.

[26]  Shan Guo Quan,et al.  Fast Data Aggregation Algorithm for Minimum Delay in Clustered Ubiquitous Sensor Networks , 2008, 2008 International Conference on Convergence and Hybrid Information Technology.

[27]  Kamlesh Gupta,et al.  Security issues in wireless sensor networks , 2010 .

[28]  Xiaohui Liang,et al.  BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[29]  Francesco Grimaccia,et al.  Architecture and Methods for Innovative Heterogeneous Wireless Sensor Network Applications , 2012, Remote. Sens..

[30]  Chi-Chang Chen,et al.  A NOVEL RANGE -FREE LOCALIZATION SCHEME FOR WIRELESS SENSOR NETWORKS , 2012, AdhocNets 2012.

[31]  Ronald L. Rivest,et al.  The RC5 Encryption Algorithm , 1994, FSE.

[32]  Meikang Qiu,et al.  Energy minimization for heterogeneous wireless sensor networks , 2009, J. Embed. Comput..