A Key Re-Distribution and Authentication Based Technique for Secured Communication in Clustered Wireless Sensor Networks with Node Mobility

Due to application of WSN in mission critical areas, secured message communication is very important. We have attempted to present a methodology that ensures secured communication among nodes in a hierarchical Cluster Based WSN. Our scheme works when member sensor nodes move from one Cluster Head (CH) to another. The proposed scheme is based on Key Redistribution during node mobility and development of an Authentication Model to check whether the new node in a cluster is an intruder. We have carried out extensive simulation experiments, which demonstrate the efficacy of the proposed scheme. The experiments suggest that the number of message transmission in creases linearly with the number of mobile nodes during key-redistribution when a node moves from one CH to another. We have seen that the detection efficiency of the Authentication Model is 0.9 to 1 when tunable threshold value is 0.02 and sensor nodes are sufficiently mobile.

[1]  Tingting Zhang,et al.  Detecting Anomaly Node Behavior in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[2]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.

[3]  Farooq Anjum,et al.  Security for Wireless Ad Hoc Networks , 2007 .

[4]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[5]  Yunghsiang Sam Han,et al.  A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.

[6]  Dharma P. Agrawal,et al.  An improved key distribution mechanism for large-scale hierarchical wireless sensor networks , 2007, Ad Hoc Networks.

[7]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[8]  Yau-Hwang Kuo,et al.  The new intrusion prevention and detection approaches for clustering-based sensor networks [wireless sensor networks] , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[9]  Michael Negnevitsky,et al.  Intrusion detection in sensor networks based on measurements , 2009, 2009 IEEE Sensors.

[10]  K. V. Arya,et al.  Designing Intrusion Detection to Detect Black Hole and Selective Forwarding Attack in WSN Based on Local Information , 2009, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.

[11]  S. Madhavi,et al.  An Intrusion Detection System in Mobile AdHoc Networks , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[12]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..