A Survey on Key Management Strategies for Different Applications of Wireless Sensor Networks

Wireless Sensor Networks (WSN) have proved to be useful in applications that involve monitoring of real-time data. There is a wide variety of monitoring applications that can employ Wireless Sensor Network. Characteristics of a WSN, such as topology and scale, depend upon the application, for which it is employed. Security requirements in WSN vary according to the application dependent network characteristics and the characteristics of an application itself. Key management is the most important aspect of security as some other security modules depend on it. We discuss application dependent variations in WSN, corresponding changes in the security requirements of WSN and the applicability of existing key management solutions in each scenario.

[1]  Mohamed F. Younis,et al.  Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks , 2006, IEEE Transactions on Parallel and Distributed Systems.

[2]  Kamlesh Gupta,et al.  Security issues in wireless sensor networks , 2010 .

[3]  Andy Hopper,et al.  A new location technique for the active office , 1997, IEEE Wirel. Commun..

[4]  Paolo Fiorini,et al.  Human++: autonomous wireless sensors for body area networks , 2005, Proceedings of the IEEE 2005 Custom Integrated Circuits Conference, 2005..

[5]  N. Noury,et al.  Monitoring behavior in home using a smart fall sensor and position sensors , 2000, 1st Annual International IEEE-EMBS Special Topic Conference on Microtechnologies in Medicine and Biology. Proceedings (Cat. No.00EX451).

[6]  Leslie Lamport,et al.  Password authentication with insecure communication , 1981, CACM.

[7]  S. Sitharama Iyengar,et al.  Grid Coverage for Surveillance and Target Location in Distributed Sensor Networks , 2002, IEEE Trans. Computers.

[8]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[9]  Gang Zhou,et al.  VigilNet: An integrated sensor network system for energy-efficient surveillance , 2006, TOSN.

[10]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[11]  John Anderson,et al.  Wireless sensor networks for habitat monitoring , 2002, WSNA '02.

[12]  Prasant Mohapatra,et al.  Power conservation and quality of surveillance in target tracking sensor networks , 2004, MobiCom '04.

[13]  Mohamed Eltoweissy,et al.  Combinatorial Optimization of Group Key Management , 2003, Journal of Network and Systems Management.

[14]  Deva Seetharam,et al.  An efficient pseudo random number generator for low-power sensor networks [wireless networks] , 2004, 29th Annual IEEE International Conference on Local Computer Networks.

[15]  Stefano Faralli,et al.  The Situation Lens: A Metaphor for Personal Task Management on Mobile Devices , 2009, J. Comput. Sci. Eng..

[16]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[17]  Donggang Liu,et al.  Establishing pairwise keys in distributed sensor networks , 2005, TSEC.

[18]  Deborah Estrin,et al.  Rumor routing algorthim for sensor networks , 2002, WSNA '02.

[19]  Bruce H. Krogh,et al.  Energy-efficient surveillance system using wireless sensor networks , 2004, MobiSys '04.

[20]  Alex Pentland,et al.  Recognizing user context via wearable sensors , 2000, Digest of Papers. Fourth International Symposium on Wearable Computers.

[21]  G. Troster,et al.  UWB for noninvasive wireless body area networks: channel measurements and results , 2003, IEEE Conference on Ultra Wideband Systems and Technologies, 2003.

[22]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[23]  Thomas Falck,et al.  Plug 'n Play Simplicity for Wireless Medical Body Sensors , 2006, 2006 Pervasive Health Conference and Workshops.

[24]  Kirk Martinez,et al.  Environmental Sensor Networks , 2005 .

[25]  Dusan Starcevic,et al.  User-centered Design of m-Learning System: Moodle On The Go , 2010, J. Comput. Sci. Eng..

[26]  Sandeep K. S. Gupta,et al.  Biosec: a biometric based approach for securing communication in wireless networks of biosensors implanted in the human body , 2003, 2003 International Conference on Parallel Processing Workshops, 2003. Proceedings..

[27]  Diane J. Cook,et al.  MavHome: an agent-based smart home , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[28]  Qiang Huang,et al.  Fast authenticated key establishment protocols for self-organizing sensor networks , 2003, WSNA '03.

[29]  Heejo Lee,et al.  MUQAMI+: a scalable and locally distributed key management scheme for clustered sensor networks , 2010, Ann. des Télécommunications.

[30]  Qun Li,et al.  Efficient Implementation of Public Key Cryptosystems on Mote Sensors (Short Paper) , 2006, ICICS.

[31]  N. Xu A Survey of Sensor Network Applications , 2002 .

[32]  Mark T. Keane,et al.  A Wireless Sensor Network Application Requirements Taxonomy , 2008, 2008 Second International Conference on Sensor Technologies and Applications (sensorcomm 2008).

[33]  John Stanley,et al.  Applying Video Sensor Networks to Nearshore Environment Monitoring , 2003, IEEE Pervasive Comput..

[34]  Min Song,et al.  Biomedical Ontologies and Text Mining for Biomedicine and Healthcare: A Survey , 2008, J. Comput. Sci. Eng..

[35]  Heejo Lee,et al.  BARI: A Distributed Key Management Approach for Wireless Body Area Networks , 2009, 2009 International Conference on Computational Intelligence and Security.

[36]  Satish Kumar,et al.  Next century challenges: scalable coordination in sensor networks , 1999, MobiCom.

[37]  Michael D. Smith,et al.  A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[38]  M. Klemm,et al.  Textile UWB Antennas for Wireless Body Area Networks , 2006, IEEE Transactions on Antennas and Propagation.

[39]  William G. Scanlon,et al.  Analysis of the performance of IEEE 802.15.4 for medical sensor body area networking , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[40]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[41]  Frank Mueller,et al.  Encryption overhead in embedded systems and sensor network nodes: modeling and analysis , 2003, CASES '03.

[42]  Donald E. Brown,et al.  Health-status monitoring through analysis of behavioral patterns , 2005, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[43]  Aleksandar Milenkovic,et al.  System architecture of a wireless body area sensor network for ubiquitous health monitoring , 2005 .

[44]  Nael B. Abu-Ghazaleh,et al.  A taxonomy of wireless micro-sensor network models , 2002, MOCO.

[45]  Dario Pompili,et al.  Underwater acoustic sensor networks: research challenges , 2005, Ad Hoc Networks.

[46]  Aleksandar Milenkovic,et al.  Journal of Neuroengineering and Rehabilitation Open Access a Wireless Body Area Network of Intelligent Motion Sensors for Computer Assisted Physical Rehabilitation , 2005 .

[47]  Virginio Cantoni,et al.  Future scenarios of parallel computing: Distributed sensor networks , 2007, J. Vis. Lang. Comput..

[48]  Stephen S. Intille,et al.  Designing a Home of the Future , 2002, IEEE Pervasive Comput..

[49]  Hosein Didehkhani,et al.  A Framework for Investigating Mobile Web Success in the Context of E-commerce: an Analytic Network Process (ANP) Approach , 2010, J. Comput. Sci. Eng..

[50]  Carmen C. Y. Poon,et al.  A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health , 2006, IEEE Communications Magazine.

[51]  Ad Hoc Communications 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks : IEEE SECON 2004 : 4-7 October 2004, Santa Clara, California, USA , 2004 .

[52]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[53]  David E. Culler,et al.  Supporting aggregate queries over ad-hoc wireless sensor networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[54]  Tian He,et al.  Differentiated surveillance for sensor networks , 2003, SenSys '03.

[55]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[56]  Ulf Lindqvist,et al.  Key management and secure software updates in wireless process control environments , 2008, WiSec '08.

[57]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[58]  Gianluca Dini,et al.  An efficient key revocation protocol for wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).