Open Access
Subscription Access
Open Access
Subscription Access
A Key Management Technique to Secure Information Sharing of the Nodes within a Cluster of WSN
Subscribe/Renew Journal
The nodes within a cluster of Wireless Sensor Network deployed in adverse areas face the security threats of eavesdropping and capturing. The fundamental issue in wireless sensor network security is to initialise secure communication between sensor nodes by setting up secret keys between communicating nodes. Because of limited hardware capacity, conventional network cryptography is infeasible for sensor network. In this paper a key management technique is proposed for clustered sensor network that uses some cryptographic operation to generate secret keys. This key is updated in response to the message of cluster head or base station. The key update instructions are stored in each sensor nodes before deployed in sensor field. The updated secret key is used to communicate between nodes and cluster head.
Keywords
Sensor Network, Clustering Technique, Key Management, Authentication, Security.
Subscription
Login to verify subscription
User
Font Size
Information
- Abuhelaleh, M A. (2010). Security in wireless sensor networks: Key management module in SOOAWSN. International Journal of Network Security & Its Applications, October, 2(4), 67-78.
- Akkaya, K., and Younis, M. (2005). A survey of routing protocols in wireless sensor networks. Ad Hoc Network Journal, 3(3), 325-349.
- Diop, A. (2014). An improved key management scheme for hierarchical wireless sensors networks. Indonesian Journal of Electrical Engineering, May, 12(5), 3969-3978.
- Du, W., Deng, J., Han, Y., Chen, S., & Varshney, P. (2004). A Key Management Scheme for Wireless Sensor Networks using Deployment Knowledge. In IEEE INFOCOM.
- Eschenaur, L., and Gligor, V. D. (2002). A Key Management Scheme for Distributed Sensors Networks. In Proceedings of the 9th ACM Conference on Computer and Communications Security, (pp. 4147). Washington, DC, USA: ACM Press.
- Heinzelman, W. R., Chandrakasan, A., and Balakrishnan, H. (2000). Energy Efficient Communication Protocol for Wireless Micro-sensor Networks. In Proceedings of the 33rd Hawaii International Conference on System Sciences.
- Hu, F., Siddiqi, W., and Sankar, K. (2007). Scalable security in Wireless Sensor and Actuator Networks (WSANs): Integration re-keying with routing. Computer Networks, 51, 285-308, Science Direct, Elsevier.
- Kaplantzis, S. (2006). Security Models for Wireless Sensor Networks.
- Karlof, C., and Wagner, D. (2003). Secure routing in sensor networks: Attacks and countermeasures. Ad Hoc Networks Journal, 1(2-3), 293-315.
- Kaur, G. (2015). Survey on various key management Schemes for LEACH in wireless sensor networks. International Journal of Advanced Research in Computer Science and Software Engineering, March, 5(3), 205-209.
- Laskar, T., and Jena, D. (2015). A secure key management scheme for hierarchical WSN. Computer Engineering and Intelligent Systems, 6(2), 30-36.
- Lec, J. C., Victor, C., and Leung, M. (2007). Key Management Issues in Wireless Sensor Networks: Current Proposals and Future Developments. In Proceeding of IEEE Wireless Communications, (pp. 76-78).
- Lindsey, S., and Raghavendra, C. S. (2002). PEGASIS: Power Efficient Gathering in Sensor Information Systems. In the Proceedings of the IEEE Aerospace Conference, Big Sky, Montana.
- Liu, D., and Ning, P. (2003). Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In Proceedings of the 10th Annual Network and Distributed System Security Symposium, (pp. 263-276), San Diego, California, February.
- MICA2: Crossbow Technologies. (2009). Retrieved from www.xbow.com/Products/Product_pdf_files/ Wireless_pdf/MICA2_Datasheet.pdf
- Patil, S. (2004). Performance Measurement of Ad Hoc Sensor Networks Under Threats. In IEEE Communications Society, Wireless Communications and Networking Conference (WCNC), Atlanta, USA.
- Perrig, A., Szewezyk, R., Tygar, J. D., Wen, V., and Culler, D. E. (2002). SPINS: Security protocols for sensor networks. Wireless Networking, 8(5), 521-534.
- Roosta, T., Shieh, S., and Sastry, S. (2006). Taxonomy of security attacks in sensor networks and counter-measures. Berkeley, California, University Press, 2006.
- Schneier, B. (1996). Applied cryptography. John Wiley and Sons (2nd ed).
- Watro, R., Kong, D., Cuti, S. Gardiner, C., Lynn, C., and Kruus, P. (2004). Tinypk: Securing Sensor Networks with Public Key Technology. In Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04), pp. 59-64.
- Wu, J., and Stinson, D. R. (2011). Three Improved Algorithms for Multipath Key Establishment in Sensor Networks Using Protocols for Secure Message Transmission. In Proceeding of IEEE Transaction on Dependable and Secure Computing, November/December, 8(6), 785-797.
- Yongshegliu. (2011). PKC Based Broadcast Authentication using Signature Amortization for WSNs. In Proceeding of IEEE Transaction on Wireless Communications, June, 11(6), 581-587.
- Zia, T. A., and Zomaya, A. Y. (2006a). Security Issues in Wireless Sensor Networks. In the Proceedings of the International Conference on Systems and Networks (ICSNC’06), November, (pp. 2-4). Tahiti, French Polynesia.
- Zia, T. A., and Zomaya, A. Y. (2006b). A Security Framework for Wireless Sensor Networks. In Proceedings of the IEEE Sensor Applications Symposium SAS, February, pp. 7-9, Houston, Texas, USA.
Abstract Views: 375
PDF Views: 0