Open Access Open Access  Restricted Access Subscription Access

A Modified Hierarchical Multiple Key Agreement Scheme for WSN.


Affiliations
1 Department of Computer Science, Faculty of Science, Qom University, Qom., Iran, Islamic Republic of
2 Faculty of Mathematical Sciences, Qom University, Qom., Iran, Islamic Republic of
 

Nowadays, sensor networks are one of the hottest scientific issues. A lot of research has been done to improve their efficiency. Wireless Sensor Networks (WSN) are applied as an important and efficient technology in many industries such as military operations, security systems, intelligent transportation systems, medics, agriculture, and many others. Key agreement is a challenging point in the security of these networks. Sensor nodes connect to each other using cryptography techniques, however, use of the classic key management techniques such as key distribution center is inefficient because of resource-constrained nature of the sensor nodes. This paper proposes a hierarchical multiple key agreement scheme. In the proposed scheme, two nodes can produce multiple session keys, just with only one run of the key agreement protocol by two nodes in the hierarchical system. As well as its efficiency, this new scheme is based on identity and non-interactive protocol. Being zero-knowledge proof is another advantage of the scheme.

Keywords

WSN, Key management, Hierarchical multiple key management, Public key cryptography, Multiple key agree-ment, Identity-based encryption.
User
Notifications
Font Size

  • H. Kim, “Non-Interactive Hierarchical Key Agreement Protocol Over Hierarchical Wireless Sensor Networks,”in Computer Applications for Security, Control and Sys-tem Engineering. Springer, 2012, pp. 86–93.
  • Yong Wang and Garhan Attebury and Byrav Rama-murthy, “A survey of security issues in wireless sensor networks,”IEEE Communications Surveys & Tutorials, vol. 8, pp. 2–23, 2006.
  • I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A Survey on Sensor Networks,”IEEE Com-munications magazine, vol. 40, no. 8, pp. 102–114, 2002.
  • J. P. Yick, “Advanced Services in Wireless Sensor Net-works,”Ph.D. dissertation, Davis, CA, USA, 2007.
  • M. Turkanovic, B. Brumen, and M. Holbl, “A Novel User Authentication and Key Agreement Scheme for Heterogeneous Ad Hoc Wireless Sensor Networks, Based on the Internet of Things Notion,”vol. 20, p. 96–112, 04 2014.
  • L. B. Oliveira, H. C. Wang, and A. A. Loureiro, “LHA-SP: Secure Protocols for Hierarchical Wireless Sensor Networks,”in Integrated Network Management, 2005. IM 2005. 2005 9th IFIP/IEEE International Symposium on. IEEE, 2005, pp. 31–44.
  • H. Kim, “Efficient and Non-Interactive Hierarchical Key Agreement in WSNs,”Int. J. Secur. Its Appl, vol. 7, pp. 159–170, 2013.
  • S.-W. Lee and H. Kim, “Freshness Consideration of Hierarchical Key Agreement Protocol in WSNs,”Int. J. Secur. Its Appl, vol. 8, pp. 81–91, 2014.
  • R. Gennaro, S. Halevi, H. Krawczyk, T. Rabin, S. Reidt, and S. D. Wolthusen, “Strongly-Resilient and Non-Interactive Hierarchical Key-Agreement in MANETs,”in European Symposium on Research in Computer Security. Springer, 2008, pp. 49–65.
  • X. He, M. Niedermeier, and H. De Meer, “Dynamic Key Management in Wireless Sensor Networks: A Survey,”Journal of Network and Computer Applications, vol. 36, no. 2, pp. 611–622, 2013.
  • A. Shamir, “Identity-based cryptosystems and signature schemes,”in Workshop on the theory and application of cryptographic techniques. Springer, 1984, pp. 47–53.
  • U. M. Maurer and Y. Yacobi, “A non-interactive public-key distribution system,”Designs, Codes and Cryptog-raphy, vol. 9, no. 3, pp. 305–316, 1996.
  • D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,”in Annual international cryptol-ogy conference. Springer, 2001, pp. 213–229.
  • Chaturvedi, A., et al., A New Key Agreement Protocol Using BDP and CSP in Non Commutative Groups. International Journal of Advanced Networking and Applications, 2017. 9(3): p. 3428-3431.

Abstract Views: 110

PDF Views: 0




  • A Modified Hierarchical Multiple Key Agreement Scheme for WSN.

Abstract Views: 110  |  PDF Views: 0

Authors

Reza Alimoradi
Department of Computer Science, Faculty of Science, Qom University, Qom., Iran, Islamic Republic of
Fateme Amjadi
Department of Computer Science, Faculty of Science, Qom University, Qom., Iran, Islamic Republic of
Seiied-Mohammad-Javad Razavian
Department of Computer Science, Faculty of Science, Qom University, Qom., Iran, Islamic Republic of
M. H. Noorallahzadeh
Faculty of Mathematical Sciences, Qom University, Qom., Iran, Islamic Republic of

Abstract


Nowadays, sensor networks are one of the hottest scientific issues. A lot of research has been done to improve their efficiency. Wireless Sensor Networks (WSN) are applied as an important and efficient technology in many industries such as military operations, security systems, intelligent transportation systems, medics, agriculture, and many others. Key agreement is a challenging point in the security of these networks. Sensor nodes connect to each other using cryptography techniques, however, use of the classic key management techniques such as key distribution center is inefficient because of resource-constrained nature of the sensor nodes. This paper proposes a hierarchical multiple key agreement scheme. In the proposed scheme, two nodes can produce multiple session keys, just with only one run of the key agreement protocol by two nodes in the hierarchical system. As well as its efficiency, this new scheme is based on identity and non-interactive protocol. Being zero-knowledge proof is another advantage of the scheme.

Keywords


WSN, Key management, Hierarchical multiple key management, Public key cryptography, Multiple key agree-ment, Identity-based encryption.

References