Novel Design of Secure End-to-End Routing Protocol in Wireless Sensor Networks

In wireless sensor networks, the secure end-to-end data communication is needed to collect data from source to destination. Collected data are transmitted in a path consisting of connected links. All existing end-to-end routing protocols propose solutions in which each link uses a pairwise shared key to protect data. In this paper, we propose a novel design of secure end-to-end data communication. We adopt a newly published group key pre-distribution scheme in our design, such that there is a unique group key, called path key, to protect data transmitted in the entire routing path. Specifically, instead of using multiple pairwise shared keys to repeatedly perform encryption and decryption over every link, our proposed scheme uses a unique end-to-end path key to protect data transmitted over the path. Our protocol can authenticate sensors to establish the path and to establish the path key. The main advantage using our protocol is to reduce the time needed to process data by intermediate sensors. Moreover, our proposed authentication scheme has complexity O(n), where n is the number of sensors in a communication path, which is different from all existing authentication schemes which are one-to-one authentications with complexity O(n2). The security of the protocol is computationally secure.

[1]  Ivan Stojmenovic,et al.  Pairwise and Triple Key Distribution in Wireless Sensor Networks with Applications , 2013, IEEE Transactions on Computers.

[2]  I. Downnard Public-key cryptography extensions into Kerberos , 2003 .

[3]  Bahram Honary,et al.  Matrix-based memory efficient symmetric key generation and pre-distribution scheme for wireless sensor networks , 2012, IET Wirel. Sens. Syst..

[4]  R. J. D'Souza,et al.  Digital Signature-Based Secure Node Disjoint Multipath Routing Protocol for Wireless Sensor Networks , 2012, IEEE Sensors Journal.

[5]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[6]  Wenjing Lou,et al.  Multi-user Broadcast Authentication in Wireless Sensor Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[7]  Wei-Chi Ku Weaknesses and drawbacks of a password authentication scheme using neural networks for multiserver architecture , 2005, IEEE Transactions on Neural Networks.

[8]  Jong Wook Hong,et al.  Combined Authentication-Based Multilevel Access Control in Mobile Application for DailyLifeService , 2010, IEEE Transactions on Mobile Computing.

[9]  Reza Azarderakhsh,et al.  Efficient Algorithm and Architecture for Elliptic Curve Cryptography for Extremely Constrained Secure Applications , 2014, IEEE Transactions on Circuits and Systems I: Regular Papers.

[10]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[11]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[12]  Manik Lal Das,et al.  Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.

[13]  Donald Ervin Knuth,et al.  The Art of Computer Programming, Volume II: Seminumerical Algorithms , 1970 .

[14]  Rolf Blom,et al.  Non-Public Key Distribution , 1982, CRYPTO.

[15]  J. Yan,et al.  Password memorability and security: empirical results , 2004, IEEE Security & Privacy Magazine.

[16]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[17]  Lein Harn,et al.  Predistribution Scheme for Establishing Group Keys in Wireless Sensor Networks , 2015, IEEE Sensors Journal.

[18]  Sriram Chellappan,et al.  Providing End-to-End Secure Communications in Wireless Sensor Networks , 2011, IEEE Transactions on Network and Service Management.

[19]  Lein Harn,et al.  Generalized Digital Certificate for User Authentication and Key Establishment for Secure Communications , 2011, IEEE Transactions on Wireless Communications.

[20]  Yunghsiang Sam Han,et al.  A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.