Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Key Management Technique to Secure Information Sharing of the Nodes within a Cluster of WSN


Affiliations
1 Department of Computer Science and Engineering, Islamic University, Kushtia, Bangladesh
     

   Subscribe/Renew Journal


The nodes within a cluster of Wireless Sensor Network deployed in adverse areas face the security threats of eavesdropping and capturing. The fundamental issue in wireless sensor network security is to initialise secure communication between sensor nodes by setting up secret keys between communicating nodes. Because of limited hardware capacity, conventional network cryptography is infeasible for sensor network. In this paper a key management technique is proposed for clustered sensor network that uses some cryptographic operation to generate secret keys. This key is updated in response to the message of cluster head or base station. The key update instructions are stored in each sensor nodes before deployed in sensor field. The updated secret key is used to communicate between nodes and cluster head.

Keywords

Sensor Network, Clustering Technique, Key Management, Authentication, Security.
Subscription Login to verify subscription
User
Notifications
Font Size


  • Abuhelaleh, M A. (2010). Security in wireless sensor networks: Key management module in SOOAWSN. International Journal of Network Security & Its Applications, October, 2(4), 67-78.
  • Akkaya, K., and Younis, M. (2005). A survey of routing protocols in wireless sensor networks. Ad Hoc Network Journal, 3(3), 325-349.
  • Diop, A. (2014). An improved key management scheme for hierarchical wireless sensors networks. Indonesian Journal of Electrical Engineering, May, 12(5), 3969-3978.
  • Du, W., Deng, J., Han, Y., Chen, S., & Varshney, P. (2004). A Key Management Scheme for Wireless Sensor Networks using Deployment Knowledge. In IEEE INFOCOM.
  • Eschenaur, L., and Gligor, V. D. (2002). A Key Management Scheme for Distributed Sensors Networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security, (pp. 4147). Washington, DC, USA: ACM Press.
  • Heinzelman, W. R., Chandrakasan, A., and Balakrishnan, H. (2000). Energy Efficient Communication Protocol for Wireless Micro-sensor Networks. In Proceedings of the 33rd Hawaii International Conference on System Sciences.
  • Hu, F., Siddiqi, W., and Sankar, K. (2007). Scalable security in Wireless Sensor and Actuator Networks (WSANs): Integration re-keying with routing. Computer Networks, 51, 285-308, Science Direct, Elsevier.
  • Kaplantzis, S. (2006). Security Models for Wireless Sensor Networks.
  • Karlof, C., and Wagner, D. (2003). Secure routing in sensor networks: Attacks and countermeasures. Ad Hoc Networks Journal, 1(2-3), 293-315.
  • Kaur, G. (2015). Survey on various key management Schemes for LEACH in wireless sensor networks. International Journal of Advanced Research in Computer Science and Software Engineering, March, 5(3), 205-209.
  • Laskar, T., and Jena, D. (2015). A secure key management scheme for hierarchical WSN. Computer Engineering and Intelligent Systems, 6(2), 30-36.
  • Lec, J. C., Victor, C., and Leung, M. (2007). Key Management Issues in Wireless Sensor Networks: Current Proposals and Future Developments. In Proceeding of IEEE Wireless Communications, (pp. 76-78).
  • Lindsey, S., and Raghavendra, C. S. (2002). PEGASIS: Power Efficient Gathering in Sensor Information Systems. In the Proceedings of the IEEE Aerospace Conference, Big Sky, Montana.
  • Liu, D., and Ning, P. (2003). Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In Proceedings of the 10th Annual Network and Distributed System Security Symposium, (pp. 263-276), San Diego, California, February.
  • MICA2: Crossbow Technologies. (2009). Retrieved from www.xbow.com/Products/Product_pdf_files/ Wireless_pdf/MICA2_Datasheet.pdf
  • Patil, S. (2004). Performance Measurement of Ad Hoc Sensor Networks Under Threats. In IEEE Communications Society, Wireless Communications and Networking Conference (WCNC), Atlanta, USA.
  • Perrig, A., Szewezyk, R., Tygar, J. D., Wen, V., and Culler, D. E. (2002). SPINS: Security protocols for sensor networks. Wireless Networking, 8(5), 521-534.
  • Roosta, T., Shieh, S., and Sastry, S. (2006). Taxonomy of security attacks in sensor networks and counter-measures. Berkeley, California, University Press, 2006.
  • Schneier, B. (1996). Applied cryptography. John Wiley and Sons (2nd ed).
  • Watro, R., Kong, D., Cuti, S. Gardiner, C., Lynn, C., and Kruus, P. (2004). Tinypk: Securing Sensor Networks with Public Key Technology. In Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04), pp. 59-64.
  • Wu, J., and Stinson, D. R. (2011). Three Improved Algorithms for Multipath Key Establishment in Sensor Networks Using Protocols for Secure Message Transmission. In Proceeding of IEEE Transaction on Dependable and Secure Computing, November/December, 8(6), 785-797.
  • Yongshegliu. (2011). PKC Based Broadcast Authentication using Signature Amortization for WSNs. In Proceeding of IEEE Transaction on Wireless Communications, June, 11(6), 581-587.
  • Zia, T. A., and Zomaya, A. Y. (2006a). Security Issues in Wireless Sensor Networks. In the Proceedings of the International Conference on Systems and Networks (ICSNC’06), November, (pp. 2-4). Tahiti, French Polynesia.
  • Zia, T. A., and Zomaya, A. Y. (2006b). A Security Framework for Wireless Sensor Networks. In Proceedings of the IEEE Sensor Applications Symposium SAS, February, pp. 7-9, Houston, Texas, USA.

Abstract Views: 375

PDF Views: 0




  • A Key Management Technique to Secure Information Sharing of the Nodes within a Cluster of WSN

Abstract Views: 375  |  PDF Views: 0

Authors

Md. Habibur Rahman
Department of Computer Science and Engineering, Islamic University, Kushtia, Bangladesh
Md. Ibrahim Abdullah
Department of Computer Science and Engineering, Islamic University, Kushtia, Bangladesh

Abstract


The nodes within a cluster of Wireless Sensor Network deployed in adverse areas face the security threats of eavesdropping and capturing. The fundamental issue in wireless sensor network security is to initialise secure communication between sensor nodes by setting up secret keys between communicating nodes. Because of limited hardware capacity, conventional network cryptography is infeasible for sensor network. In this paper a key management technique is proposed for clustered sensor network that uses some cryptographic operation to generate secret keys. This key is updated in response to the message of cluster head or base station. The key update instructions are stored in each sensor nodes before deployed in sensor field. The updated secret key is used to communicate between nodes and cluster head.

Keywords


Sensor Network, Clustering Technique, Key Management, Authentication, Security.

References