EAHKM+: energy-aware secure clustering scheme in wireless sensor networks (original) (raw)

A New Hierarchical Key Management Scheme for Secure Clustering in Wireless Sensor Networks

Lecture Notes in Computer Science, 2015

In Wireless Sensor Networks (WSNs), clustering is the suitable topology to save the energy of sensor nodes. In this paper, we provide a secured cluster formation by proposing a new symmetric key management scheme for hierarchical WSNs. The new scheme is called EAHKM (Energy Aware Hierarchical Key Management in WSNs). EAHKM needs the pre-distribution of only three keys in each sensor node before deployment, and it ensures a secure cluster formation after deployment. EAHKM assures the establishment of a pairwise key between each sensor node and its cluster head, thus the establishment of a broadcast key in each cluster in the network. Simulation results show that EAHKM provides an energy-efficient, flexible and scalable solution to the key management problem in hierarchical WSNs, and it presents a good resilience to node compromising attacks than other hierarchical key management schemes.

An Efficient and Secure Key Management Scheme for Hierarchical Wireless Sensor Networks

International Journal of Computer and Communication Engineering, 2012

Key management in wireless sensor network is a complex task due to its nature of environment. Wireless sensor network comprise of large number of sensor nodes with different hardware abilities and functions. Due to the limited memory resources and energy constraints, complex security algorithms cannot be used in sensor networks. Therefore, an energy efficient key management scheme is necessary to mitigate the security risks. In this paper, we present an Efficient and Secure Key Management Scheme for Hierarchical Wireless Sensor Network (ESKMS). The proposed technique distributes the keys within a cluster efficiently and updates the pre-deployed keys to mitigate the node compromise attack. We also provide a detailed security analysis of our ESKMS protocol and show its advantages in avoiding different type of attacks from malicious nodes. Finally, using NS-2 simulator, the results shows that ESKMS is more energy efficient and provides a longer network lifetime compared to the existing key management schemes.

A Novel Secure Key Management Module for Hierarchical Clustering Wireless Sensor Networks

—Secure key management is crucial to meet the security goals to prevent the Wireless Sensor Networks (WSNs) being compromised by an adversary. Owing to ad-hoc nature and resource limitations of sensor networks, provisioning a right key management is challenging. In this paper we present a Novel Secure Key Management (NSKM) module providing an efficient scalable post-distribution key establishment that allows the hierarchical clustering topology platform to provision acceptable security services. To the best of our knowledge this module is the first implemented security module for wireless sensor networks that provisions reasonable resistance against replay and node capture attacks. Furthermore, it provides highly lightweight and scalable scheme. Also it is acceptable to be used in a wireless sensor network of thousands of sensor nodes.

An Energy-Efficient Security Node-Based Key Management Protocol for WSN

Applied Mechanics and Materials, 2013

A security node-based key management protocol is proposed for cluster-based sensor networks. Member nodes and cluster heads are responsible for data collection and transmission. Security nodes are responsible for key management. Security nodes restrain key management function of cluster heads, and reduce damage of captured cluster heads. Generation of security nodes and different kinds of keys is described. Performance analysis and simulation show that the proposed key management protocol consumes less energy, and its delay time of key generation is short. At the same time, the protocol can provide more collaborative authentication security for keys. It has strong resilience against node capture, and can support large scale network.

An Authenticated Key Management Scheme for Hierarchical Wireless Sensor Networks

Due to recent advances in electronic industry, wireless sensors can be used in various ubiqutous and pervasive applications such as military, security, healthcare [1,2], industry automation, and environmental and habitat monitoring [3,4].Wireless sensor networks (WSNs) consist of a large number of low-power nodes, with limited processing, communication, and storage resources [5]. Due to limited resources of WSNs, it is challenging to incorporate basic security functions such as authentication, access control, data integrity, privacy, and key distribution. For instance, asymmetric cryptography such as RSA or elliptic curve cryptography (ECC) is unsuitable for most sensor architectures due to high energy consumption and increased code storage requirements. To avoid the use of asymmetric cryptography, several alternative approaches have been developed to perform key management on resourceconstrained sensor networks, such as random key predistribution schemes, plain text key exchange schemes, and transitory master key schemes In WSNs, hierarchical clustering provides scalability, self-organization, and energy efficient data dissemination [6]. A number of cluster formation protocols have been proposed, but most existing protocols assume benign environments, and are vulnerable to attacks from malicious nodes. In this chapter, we use an existing ring structure, energy-efficient, clustering architecture (RECA) [7] to divide nodes into clusters. However, we modify its initial cluster formation algorithm by providing an authentication mechanism so that no malicious node can take part in the cluster formation process. The proposed authenticated key management (AKM) scheme enables only legitimate nodes to join the network.

Survey on Key Management Schemes and Cluster based Routing Protocols in Wireless Sensor Network

Sensor nodes in the wireless sensor networks are low cost tiny devices with limited storage, computational capability and power except the sink node. Sink node has no resource limitation. WSNs have wide range of application in the real world problem such as military and civilian domain etc. Energy efficient and security are two major issues of sensor network due to unattended and unprotected. The sensors have limited battery power and low computational capability, thus requires a security mechanism that must be energy efficient. In this paper, we identify the some existing schemes of key management in WSNs. Secure key management has been becoming important critical elements when integrating cryptographic functions into a system. An outline of symmetric and asymmetric key cryptography Key infection schemes are discussed in this paper. As a consequence, we analyze the advantages and disadvantages of current secure key management schemes.

SECURITY KEY MANAGEMENT AND AUTHENTICATION SCHEME FOR WIRELESS SENSOR NETWORKS

Wireless Sensor Networks (WSN) is vulnerable to node capture attacks in which an attacker can capture one or more sensor nodes and reveal all stored security information which enables him to compromise a part of the WSN communications. Due to large number of sensor nodes and lack of information about deployment and hardware capabilities of sensor node, key management in wireless sensor networks has become a complex task. Limited memory resources and energy constraints are the other issues of key management in WSN. Hence an efficient key management scheme is necessary which reduces the impact of node capture attacks and consume less energy. In this study, we develop a cluster based technique for key management in wireless sensor network.

Key Management for Hierarchical Wireless Sensor Networks: A Robust Scheme

EAI Endorsed Transactions on Internet of Things, 2020

Secure data transmission within the wireless sensor networks (WSNs) is a critical issue as they are mostly deployed in the open areas. Moreover, the communication between the cluster head (CH) and the base station (BS) in a hierarchical WSN is required to be more secure since the CH is responsible for data collection, aggregation and its forwarding to the BS. Thus, this paper aims to design a hybrid key management scheme (KMS) for the hierarchical WSNs for enhancing security between the CH and BS by using some asymmetric cryptographic technique while applying the secret key based communication among the member nodes to reduce their computational overheads. The security analysis of our proposed scheme exhibits its robustness against the node capture attack and its ability to support the node revocation. The performances of proposed scheme are also evaluated in term of data freshness, average number of keys established, throughput and computational cost to demonstrate its efficiency.

Energy and communication efficient group key management protocol for hierarchical sensor networks

2006

In this paper, we describe a group key management protocol for hierarchical sensor networks where instead of using pre-deployed keys, each sensor node generates a partial key dynamically using a function. The function takes partial keys of its children as arguments. The design of the protocol is motivated by the fact that traditional cryptographic techniques are impractical in sensor networks because of associated high energy and computational overheads. The group key management protocol supports the establishment of two types of group keys; one for the nodes within a group (intra-cluster), and the other among a group of cluster head (inter-cluster). The protocol handles freshness of the group key dynamically, and eliminates the involvement of a trusted third party (TTP). We have experimentally analyzed the time and energy consumption in broadcasting partial keys and the group key under two sensor routing protocols (Tiny-AODV and Tiny-Diffusion) by varying the number of nodes and key sizes. The performance study provides the optimum number of partial keys needed for computing the group key to balance the key size for security requirements and the power consumption. The experimental study also concludes that the energy consumption of SPIN [9] increases rapidly as the number of group members increases in comparison to our protocol.

An Efficient Key Management Scheme in Multi-Tier and Multi-Cluster Wireless Sensor Networks

Int. J. Netw. Secur., 2015

Wireless Sensor Network is a collection of autonomous sensor nodes placed spatially. Unlike wired networks the sensor nodes here are subject to resource constraints such as memory, power and computation constraints. Key management and Security are the area of research in WSN. To ensure high level security encryption is necessary. The strength of any encryption algorithm depends upon the key used. So Key Management plays a significant role. The proposed KMS using LLT matrix achieves both Node-to-Node communication and Group communication. The main objective of the scheme is to strengthen the data transferring security mechanisms and also to ensure efficient key generation and management along with authentication. The main feature of this proposed system is 100% Local-connectivity; efficient node revocation methodology, perfect resilience; three-level authentication cum key generation and the most importantly reduced the storage. The scheme and its detailed performance analysis are di...