An energy and memory-efficient key management scheme for mobile heterogeneous sensor networks

Wireless Sensor Network (WSN) technology is being increasingly adopted in a wide variety of applications ranging from home/building and industrial automation to more safety critical applications including e-health or infrastructure monitoring. Considering mobility in the above application scenarios actually introduces additional technological challenges, especially with respect to security. The resource constrained devices should be robust to diverse security attacks and communicate securely while they are moving in the considered environment. To this aim, proper authentication and key management schemes supporting node mobility should be used. This paper presents an effective mutual authentication and key establishment scheme for heterogeneous sensor networks consisting of numerous mobile sensor nodes and only a few more powerful fixed sensor nodes. Moreover, OMNET++ simulations are used to provide a comprehensive performance evaluation of the proposed scheme. The obtained results show that the proposed solution assures better network connectivity, consumes less memory, has low communication overhead during the authentication and key establishment phase and has better network resilience against mobile nodes attacks compared with existing approaches for authentication and key establishment.

[1]  Bülent Yener,et al.  Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, IEEE/ACM Transactions on Networking.

[2]  Mingyan Liu,et al.  Data-gathering wireless sensor networks: organization and capacity , 2003, Comput. Networks.

[3]  S. Gandhi,et al.  An Efficient Key Management Scheme for Heterogeneous Sensor Networks , 2011 .

[4]  Mohsen Guizani,et al.  An effective key management scheme for heterogeneous sensor networks , 2007, Ad Hoc Networks.

[5]  Suresh Singh,et al.  Exploiting heterogeneity in sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[6]  G.-A. Kamendje,et al.  A tamper resistant CMOS crypto-key generation unit , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[7]  Fang Liu,et al.  Location-aware key establishment in wireless sensor networks , 2006, IWCMC '06.

[8]  Deborah Estrin,et al.  A system for simulation, emulation, and deployment of heterogeneous sensor networks , 2004, SenSys '04.

[9]  Firdous Kausar,et al.  An efficient key distribution scheme for heterogeneous sensor networks , 2007, IWCMC.

[10]  Wouter Joosen,et al.  MASY: MAnagement of Secret keYs for federated mobile wireless sensor networks , 2010, 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications.

[11]  R. S. Ramakrishna,et al.  A Level-based Key Management for both In-Network Processing and Mobility in WSNs , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.

[12]  Luciano Lavagno,et al.  An effective key management scheme for mobile heterogeneous sensor networks , 2011, International Conference on Information Society (i-Society 2011).

[13]  Liwen Zhang,et al.  A Key Management Scheme for Heterogeneous Wireless Sensor Networks Based on Group-Oriented Cryptography , 2010 .

[14]  Wuu Yang,et al.  An Improved Dynamic User Authentication Scheme for Wireless Sensor Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[15]  Moti Yung,et al.  Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..

[16]  Dharma P. Agrawal,et al.  Efficient pairwise key establishment and management in static wireless sensor networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..

[17]  Mingyan Liu,et al.  Analysis of energy consumption and lifetime of heterogeneous wireless sensor networks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.

[18]  Mohamed Abid,et al.  A lightweight user authentication scheme for Wireless Sensor Networks , 2010, ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010.

[19]  Luciano Lavagno,et al.  A key management scheme supporting node mobility in heterogeneous sensor networks , 2010, 2010 6th International Conference on Emerging Technologies (ICET).

[20]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[21]  A. S. Poornima,et al.  Tree-based key management scheme for heterogeneous sensor networks , 2008, 2008 16th IEEE International Conference on Networks.

[22]  Juwei Zhang,et al.  A Key Management Scheme for Heterogeneous Wireless Sensor Networks Based on Group-Oriented Cryptography , 2010, 2010 International Conference on Internet Technology and Applications.

[23]  Panganamala Ramana Kumar,et al.  RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .

[24]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[25]  Yau-Hwang Kuo,et al.  Two-Layered Dynamic Key Management in Mobile and Long-Lived Cluster-Based Wireless Sensor Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[26]  Liping Liu,et al.  NPKPS: a novel pairwise key pre-distribution scheme for wireless sensor networks , 2007 .

[27]  Xiaoyan Hong,et al.  An ad hoc network with mobile backbones , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).

[28]  M. Rabin DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .

[29]  Mohsen Guizani,et al.  A Routing-Driven Key Management Scheme for Heterogeneous Sensor Networks , 2007, 2007 IEEE International Conference on Communications.

[30]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[31]  Bülent Yener,et al.  Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, ESORICS.

[32]  Deng Pan,et al.  Unpredictable Software-based Attestation Solution for node compromise detection in mobile WSN , 2010, 2010 IEEE Globecom Workshops.

[33]  Pradeep K. Khosla,et al.  SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[34]  Heribert Baldus,et al.  A Deterministic Pairwise Key Pre-distribution Scheme for Mobile Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).