A mutual authentication and key establishment scheme for heterogeneous sensor networks supporting nodes mobility

In the last two decades, wireless sensor networks (WSNs) have greatly attracted the attention of the research community because their flexibility, adaptability and self-organising properties make them a technology solution suitable for diverse application scenarios ranging from home and industrial automation to military surveillance. Since these networks consist of resource constrained devices and can be deployed in remote and unattended areas, supporting security could represent a challenging task especially if mobility scenarios are taken into consideration. In this context, key management facilitates the adoption of cryptography techniques to support secure data communication and to protect the resource constrained devices from various security attacks. This paper specifically focuses on mobile heterogeneous wireless sensor networks consisting of mobile sensor nodes with few fixed sensor nodes and presents a mutual authentication and key management scheme suitable for the considered scenario. Analytical and OMNET++ simulation results show that the proposed scheme provides better network connectivity, consumes less memory, has better network resilience against attacks and introduces lower communication overhead compared to state-of-the-art solutions.

[1]  I. Rubin,et al.  Impact of the location area structure on the performance of signaling channels in wireless cellular networks , 1997 .

[2]  Prem Dassanayake,et al.  User Mobility Modeling and Characterization of Mobility Patterns , 1997, IEEE J. Sel. Areas Commun..

[3]  Firdous Kausar,et al.  An efficient key distribution scheme for heterogeneous sensor networks , 2007, IWCMC.

[4]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[5]  Liwen Zhang,et al.  A Key Management Scheme for Heterogeneous Wireless Sensor Networks Based on Group-Oriented Cryptography , 2010 .

[6]  William M. Daley,et al.  Security Requirements for Cryptographic Modules , 1999 .

[7]  Mohsen Guizani,et al.  An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.

[8]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.

[9]  Huang Jie,et al.  A key-chain based key management scheme for heterogeneous sensor network , 2010 .

[10]  M. Rabin DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .

[11]  Mohamed Abid,et al.  A lightweight user authentication scheme for Wireless Sensor Networks , 2010, ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010.

[12]  Xiaojiang Du,et al.  Maintaining Differentiated Coverage in Heterogeneous Sensor Networks , 2005, EURASIP J. Wirel. Commun. Netw..

[13]  Saber Banihashemian,et al.  A new key management scheme in heterogeneous wireless sensor networks , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).

[14]  Mingyan Liu,et al.  Data-gathering wireless sensor networks: organization and capacity , 2003, Comput. Networks.

[15]  Yau-Hwang Kuo,et al.  Two-Layered Dynamic Key Management in Mobile and Long-Lived Cluster-Based Wireless Sensor Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[16]  Mohsen Guizani,et al.  A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks , 2007, 2007 IEEE International Conference on Communications.

[17]  Wuu Yang,et al.  An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[18]  Qing Yang,et al.  An Efficient Key Management Scheme for Heterogeneous Sensor Networks , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[19]  Tracy Camp,et al.  A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..

[20]  Zygmunt J. Haas,et al.  Predictive distance-based mobility management for PCS networks , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[21]  Luciano Lavagno,et al.  A key management scheme supporting node mobility in heterogeneous sensor networks , 2010, 2010 6th International Conference on Emerging Technologies (ICET).

[22]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[23]  A. S. Poornima,et al.  Tree-based key management scheme for heterogeneous sensor networks , 2008, 2008 16th IEEE International Conference on Networks.

[24]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[25]  Suresh Singh,et al.  Exploiting heterogeneity in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[26]  Deborah Estrin,et al.  A system for simulation, emulation, and deployment of heterogeneous sensor networks , 2004, SenSys '04.

[27]  Deng Pan,et al.  Unpredictable Software-based Attestation Solution for node compromise detection in mobile WSN , 2010, 2010 IEEE Globecom Workshops.

[28]  Liping Liu,et al.  NPKPS: a novel pairwise key pre-distribution scheme for wireless sensor networks , 2007 .

[29]  Bülent Yener,et al.  Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, ESORICS.

[30]  Louise E. Moser,et al.  An analysis of the optimum node density for ad hoc mobile networks , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).

[31]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[32]  Fang Liu,et al.  Location-aware key establishment in wireless sensor networks , 2006, IWCMC '06.

[33]  Panganamala Ramana Kumar,et al.  RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .

[34]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[35]  Mingyan Liu,et al.  Analysis of energy consumption and lifetime of heterogeneous wireless sensor networks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.

[36]  Wouter Joosen,et al.  MASY: MAnagement of Secret keYs for federated mobile wireless sensor networks , 2010, 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications.

[37]  R. S. Ramakrishna,et al.  A Level-based Key Management for both In-Network Processing and Mobility in WSNs , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.

[38]  Xiaoyan Hong,et al.  An ad hoc network with mobile backbones , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).