A Novel Situation Specific Network Security for Wireless Sensor Networks

Researchers have come up with many high level security protocols and key management algorithms that can be applied for different types of networks. The main characteristics of wireless sensor networks that are limited computation and power made it difficult to apply these secure key management algorithms since it consumes much power and resources. Sensors in the field at different periods of time of their life time need higher level of security more than other times - sensors in a battlefield need higher security when it is war time. In our research we developed an adaptive security protocol for two-layer clustered heterogeneous wireless sensor networks that can toggle between five different modes of operation, each with different security level. Each level of security has its own encryption/decryption algorithm and specified key length depending on the situation of the application and the situation for the wireless sensor networks.

[1]  JAMAL N. AL-KARAKI,et al.  Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.

[2]  Jaime Lloret,et al.  Power saving and energy optimization techniques for Wireless Sensor Networks , 2011 .

[3]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[4]  Miguel Garcia,et al.  Power Saving and Energy Optimization Techniques for Wireless Sensor Neworks (Invited Paper) , 2011, J. Commun..

[5]  Kee-Young Yoo,et al.  A new elliptic curve diffie-hellman two-party key agreement protocol , 2010, 2010 7th International Conference on Service Systems and Service Management.

[6]  Omar Cheikhrouhou,et al.  Establishing Pairwise Keys in Heterogeneous Two-Tiered Wireless Sensor Networks , 2009, 2009 Third International Conference on Sensor Technologies and Applications.

[7]  Sushil Jajodia,et al.  LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.

[8]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.

[9]  Ossama Younis,et al.  Distributed clustering in ad-hoc sensor networks: a hybrid, energy-efficient approach , 2004, IEEE INFOCOM 2004.

[10]  Kavi Kumar Khedo,et al.  HIERARCHICAL HYBRID ENERGY EFFICIENT DISTRIBUTED CLUSTERING ALGORITHM , 2012 .

[11]  A S Poornima,et al.  Logical ring based key management for clustered sensor networks with changing cluster head , 2010, 2010 International Conference on Signal Processing and Communications (SPCOM).

[12]  WenCheng Yang,et al.  An authentication protocol for hierarchy-based wireless sensor networks , 2008, 2008 23rd International Symposium on Computer and Information Sciences.

[13]  Wail Mardini,et al.  Rotated Hybrid, Energy-Efficient and Distributed (R-HEED) Clustering Protocol in WSN , 2014 .

[14]  Dharma P. Agrawal,et al.  Efficient pairwise key establishment and management in static wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[15]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[16]  Reza Azarderakhsh,et al.  A Key Management Scheme for Cluster Based Wireless Sensor Networks , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[17]  Ossama Younis,et al.  HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.

[18]  Ricardo Dahab,et al.  SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).

[19]  Rahim Tafazolli,et al.  An Energy-Efficient Clustering Solution for Wireless Sensor Networks , 2011, IEEE Transactions on Wireless Communications.

[20]  Yuan Zhang,et al.  A Cluster-Based Group Key Management Scheme for Wireless Sensor Networks , 2010, 2010 12th International Asia-Pacific Web Conference.

[21]  Dawn Song,et al.  Key distribution techniques for sensor networks , 2004 .