Key management technique for heterogeneous wireless sensor networks

Advancements in wireless networking and embedded systems technology have given rise to Wireless sensor networks (WSN). WSNs promise ubiquitous data collection and processing for variety of commercial and military applications. Recently proposed Internet of things concept utilises WSN as a medium connecting physical world to virtual world. Practical realization of these applications is possible only after assuring network security. Cryptographic key distribution is a critical stage in the implementation of network security. In WSNs, due to the resource constrained nature of the nodes, it is important to design a key management protocol with minimum resource overhead. At the same time, to meet increasing security demands resource consuming asymmetric key primitives based implementations are needed. In order to address the same, hybrid key management technique is proposed. Both symmetric and asymmetric key distribution techniques are compared with the proposed scheme and also a detailed security analysis is presented.

[1]  Ayman I. Kayssi,et al.  A decentralized energy-aware key management scheme for Wireless Sensor Networks , 2011, 2011 International Conference for Internet Technology and Secured Transactions.

[2]  Paulo S. L. M. Barreto,et al.  Efficient pairing computation on supersingular Abelian varieties , 2007, IACR Cryptol. ePrint Arch..

[3]  William Stallings,et al.  Cryptography and network security , 1998 .

[4]  Nigel P. Smart,et al.  Advances in Elliptic Curve Cryptography (London Mathematical Society Lecture Note Series) , 2005 .

[5]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[6]  Ricardo Dahab,et al.  TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks , 2008, 2008 5th International Conference on Networked Sensing Systems.

[7]  Alan F. Smeaton,et al.  Security Considerations and Key Negotiation Techniques for Power Constrained Sensor Networks , 2006, Comput. J..

[8]  Sriram Chellappan,et al.  Providing End-to-End Secure Communications in Wireless Sensor Networks , 2011, IEEE Transactions on Network and Service Management.

[9]  Cristina Alcaraz,et al.  Key management systems for sensor networks in the context of the Internet of Things , 2011, Comput. Electr. Eng..

[10]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[11]  Liu Jian-hui,et al.  Research on key management scheme for WSN based on elliptic curve cryptosystem , 2009, 2009 First International Conference on Networked Digital Technologies.

[12]  Kenneth G. Paterson,et al.  Key Refreshing in Identity-Based Cryptography and its Applications in MANETs , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[13]  Srinivas Sampalli,et al.  A Hybrid Key Management Protocol for Wireless Sensor Networks , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[14]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[15]  Rabi N. Mahapatra,et al.  Key Predistribution Schemes for Establishing Pairwise Keys with a Mobile Sink in Sensor Networks , 2011, IEEE Transactions on Parallel and Distributed Systems.

[16]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[17]  Noel E. O'Connor,et al.  Low-Energy Symmetric Key Distribution in Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.

[18]  Rolf Blom,et al.  An Optimal Class of Symmetric Key Generation Systems , 1985, EUROCRYPT.