Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

An Authenticated Key Management Scheme for Hierarchical Wireless Sensor Networks

  • Chapter
Advances in Communication Systems and Electrical Engineering

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 4))

Due to recent advances in electronic industry, wireless sensors can be used in various ubiqutous and pervasive applications such as military, security, healthcare [1,2], industry automation, and environmental and habitat monitoring [3,4].Wireless sensor networks (WSNs) consist of a large number of low-power nodes, with limited processing, communication, and storage resources [5]. Due to limited resources of WSNs, it is challenging to incorporate basic security functions such as authentication, access control, data integrity, privacy, and key distribution. For instance, asymmetric cryptography such as RSA or elliptic curve cryptography (ECC) is unsuitable for most sensor architectures due to high energy consumption and increased code storage requirements. To avoid the use of asymmetric cryptography, several alternative approaches have been developed to perform key management on resourceconstrained sensor networks, such as random key predistribution schemes, plain text key exchange schemes, and transitory master key schemes

In WSNs, hierarchical clustering provides scalability, self-organization, and energy efficient data dissemination [6]. A number of cluster formation protocols have been proposed, but most existing protocols assume benign environments, and are vulnerable to attacks from malicious nodes. In this chapter, we use an existing ring structure, energy-efficient, clustering architecture (RECA) [7] to divide nodes into clusters. However, we modify its initial cluster formation algorithm by providing an authentication mechanism so that no malicious node can take part in the cluster formation process. The proposed authenticated key management (AKM) scheme enables only legitimate nodes to join the network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Gao T, Greenspan D, Welsh M, Juang RR, Alm A (2005) Vital signs monitoring and patient tracking over a wireless network. In: The 27th Annual International Conference of the IEEE EMBS, Shanghai, China

    Google Scholar 

  2. Gu L, Jia D, Vicaire P, Yan T, Luo L, Tirumala A, Cao Q, He T, Stankovic JA, Abdelzaher T, Krogh BH (2005) Lightweight detection and classification for wireless sensor networks in realistic environments. In: The 3rd ACM Conference on Embedded Networked Sensor Systems, San Diego, USA

    Google Scholar 

  3. Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) A survey on sensor networks. IEEE Communications Magazine

    Google Scholar 

  4. Kahn J, Katz R, Pister K (1999) Next century challenges: Mobile networking for smart dust. In: The ACM International Conference on Mobile Computing and Networking (MobiCom’99), Seattle, USA

    Google Scholar 

  5. Carman DW, Kruus PS, Matt BJ (2000) Constrains and approaches for distributed sensor network security. In: Technical report, NAI Labs

    Google Scholar 

  6. Zhao F, Guibas L (2004) Wireless sensor networks. Elsevier Inc 23–24

    Google Scholar 

  7. Li G, Znati T (2007) Reca: a ring-structured energy efficient cluster architecture for wireless sensor networks. International Journal of Sensor Networks 2 34–43

    Article  Google Scholar 

  8. Eschenauer L, Gligor VD (2002) A key management scheme for distributed sensor networks. In: ACM CCS

    Google Scholar 

  9. Chan H, Perrig A, Song D (2003) Random key pre-distribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy. 197–213

    Google Scholar 

  10. Perrig A, Szewczyk R, Tygar J, Victorwen, Culler DE (2001) Spins: Security protocols for sensor networks. In: Seventh Annual Int’l Conf. on Mobile Computing and Networks

    Google Scholar 

  11. Basagni S, Herrin K, Bruschi D, Rosti E (2001) Secure pebblenets. In: ACM Int’l Symp. on Mobile ad hoc networking and computing. 156–163

    Google Scholar 

  12. Blundo C, Santis AD, Herzberg A, Kutten S, Vaccaro U, Yung M (1993) Perfectly-secure key distribution for dynamic conferences. In: CRYPTO ’92: Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology, London, UK, Springer-Verlag 471–486

    Google Scholar 

  13. Blom R (1985) An optimal class of symmetric key generation systems. In: Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques, New York, NY, USA, Springer-Verlag New York, Inc. 335–338

    Google Scholar 

  14. Liu D, Ning P (2003) Location-based pairwise key establishments for static sensor networks. In: SASN ’03: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, New York, NY, USA, ACM Press 72–82

    Chapter  Google Scholar 

  15. Wadaa A, Olariu S, Wilson L, Eltoweissy M (2004) Scalable cryptographic key management in wireless sensor networks. In: ICDCSW ’04: Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW’04), Washington, DC, USA, IEEE Computer Society 796–802

    Google Scholar 

  16. Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: Attacks and countermeasures. In: IEEE Int’l Workshop on Sensor Network Protocols and Applications

    Google Scholar 

  17. Zhu S, Setia S, Jajodia S (2003) Leap: Efficient security mechanisms for large-scale distributed sensor networks. In: ACM Conference on Computer and Communications Security. 62–72

    Google Scholar 

  18. Hu F, Siddiqui W, Cao X (2005) Spectra: Secure power-efficient clustered-topology routing algorithm in large-scale wireless micro-sensor networks. International Journal of Information Technology 11

    Google Scholar 

  19. Chan SP, Poovendran R, Sun MT (2005) A key management scheme in distributed sensor networks using attack probabilities. In: IEEE Globecom

    Google Scholar 

  20. Oliveira LB, Wong HC, Bern M, Dahab R, Loureiro AAF (2006) Sec leach: A random key distribution solution for securing clustered sensor networks. In: 5th IEEE international symposium on network computing and applications. 145–154

    Google Scholar 

  21. Heinzelman WR, Chandrakasan A, Balakrishnan H (2000) Energy-efficient communication protocol for wireless microsensor networks. In: IEEE Hawaii Int. Conf. on System Sciences. 4–7

    Google Scholar 

  22. Zhu S, Xu S, Setia S, Jajodia S (2003) Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach. In: ICNP ’03: Proceedings of the 11th IEEE International Conference on Network Protocols, Washington, DC, USA, IEEE Computer Society 326

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Kausar, F., Masood, A., Hussain, S. (2008). An Authenticated Key Management Scheme for Hierarchical Wireless Sensor Networks. In: Huang, X., Chen, YS., Ao, SI. (eds) Advances in Communication Systems and Electrical Engineering. Lecture Notes in Electrical Engineering, vol 4. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-74938-9_7

Download citation

  • DOI: https://doi.org/10.1007/978-0-387-74938-9_7

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-0-387-74937-2

  • Online ISBN: 978-0-387-74938-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics