Due to recent advances in electronic industry, wireless sensors can be used in various ubiqutous and pervasive applications such as military, security, healthcare [1,2], industry automation, and environmental and habitat monitoring [3,4].Wireless sensor networks (WSNs) consist of a large number of low-power nodes, with limited processing, communication, and storage resources [5]. Due to limited resources of WSNs, it is challenging to incorporate basic security functions such as authentication, access control, data integrity, privacy, and key distribution. For instance, asymmetric cryptography such as RSA or elliptic curve cryptography (ECC) is unsuitable for most sensor architectures due to high energy consumption and increased code storage requirements. To avoid the use of asymmetric cryptography, several alternative approaches have been developed to perform key management on resourceconstrained sensor networks, such as random key predistribution schemes, plain text key exchange schemes, and transitory master key schemes
In WSNs, hierarchical clustering provides scalability, self-organization, and energy efficient data dissemination [6]. A number of cluster formation protocols have been proposed, but most existing protocols assume benign environments, and are vulnerable to attacks from malicious nodes. In this chapter, we use an existing ring structure, energy-efficient, clustering architecture (RECA) [7] to divide nodes into clusters. However, we modify its initial cluster formation algorithm by providing an authentication mechanism so that no malicious node can take part in the cluster formation process. The proposed authenticated key management (AKM) scheme enables only legitimate nodes to join the network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Gao T, Greenspan D, Welsh M, Juang RR, Alm A (2005) Vital signs monitoring and patient tracking over a wireless network. In: The 27th Annual International Conference of the IEEE EMBS, Shanghai, China
Gu L, Jia D, Vicaire P, Yan T, Luo L, Tirumala A, Cao Q, He T, Stankovic JA, Abdelzaher T, Krogh BH (2005) Lightweight detection and classification for wireless sensor networks in realistic environments. In: The 3rd ACM Conference on Embedded Networked Sensor Systems, San Diego, USA
Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) A survey on sensor networks. IEEE Communications Magazine
Kahn J, Katz R, Pister K (1999) Next century challenges: Mobile networking for smart dust. In: The ACM International Conference on Mobile Computing and Networking (MobiCom’99), Seattle, USA
Carman DW, Kruus PS, Matt BJ (2000) Constrains and approaches for distributed sensor network security. In: Technical report, NAI Labs
Zhao F, Guibas L (2004) Wireless sensor networks. Elsevier Inc 23–24
Li G, Znati T (2007) Reca: a ring-structured energy efficient cluster architecture for wireless sensor networks. International Journal of Sensor Networks 2 34–43
Eschenauer L, Gligor VD (2002) A key management scheme for distributed sensor networks. In: ACM CCS
Chan H, Perrig A, Song D (2003) Random key pre-distribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy. 197–213
Perrig A, Szewczyk R, Tygar J, Victorwen, Culler DE (2001) Spins: Security protocols for sensor networks. In: Seventh Annual Int’l Conf. on Mobile Computing and Networks
Basagni S, Herrin K, Bruschi D, Rosti E (2001) Secure pebblenets. In: ACM Int’l Symp. on Mobile ad hoc networking and computing. 156–163
Blundo C, Santis AD, Herzberg A, Kutten S, Vaccaro U, Yung M (1993) Perfectly-secure key distribution for dynamic conferences. In: CRYPTO ’92: Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology, London, UK, Springer-Verlag 471–486
Blom R (1985) An optimal class of symmetric key generation systems. In: Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques, New York, NY, USA, Springer-Verlag New York, Inc. 335–338
Liu D, Ning P (2003) Location-based pairwise key establishments for static sensor networks. In: SASN ’03: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, New York, NY, USA, ACM Press 72–82
Wadaa A, Olariu S, Wilson L, Eltoweissy M (2004) Scalable cryptographic key management in wireless sensor networks. In: ICDCSW ’04: Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW’04), Washington, DC, USA, IEEE Computer Society 796–802
Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: Attacks and countermeasures. In: IEEE Int’l Workshop on Sensor Network Protocols and Applications
Zhu S, Setia S, Jajodia S (2003) Leap: Efficient security mechanisms for large-scale distributed sensor networks. In: ACM Conference on Computer and Communications Security. 62–72
Hu F, Siddiqui W, Cao X (2005) Spectra: Secure power-efficient clustered-topology routing algorithm in large-scale wireless micro-sensor networks. International Journal of Information Technology 11
Chan SP, Poovendran R, Sun MT (2005) A key management scheme in distributed sensor networks using attack probabilities. In: IEEE Globecom
Oliveira LB, Wong HC, Bern M, Dahab R, Loureiro AAF (2006) Sec leach: A random key distribution solution for securing clustered sensor networks. In: 5th IEEE international symposium on network computing and applications. 145–154
Heinzelman WR, Chandrakasan A, Balakrishnan H (2000) Energy-efficient communication protocol for wireless microsensor networks. In: IEEE Hawaii Int. Conf. on System Sciences. 4–7
Zhu S, Xu S, Setia S, Jajodia S (2003) Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach. In: ICNP ’03: Proceedings of the 11th IEEE International Conference on Network Protocols, Washington, DC, USA, IEEE Computer Society 326
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Kausar, F., Masood, A., Hussain, S. (2008). An Authenticated Key Management Scheme for Hierarchical Wireless Sensor Networks. In: Huang, X., Chen, YS., Ao, SI. (eds) Advances in Communication Systems and Electrical Engineering. Lecture Notes in Electrical Engineering, vol 4. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-74938-9_7
Download citation
DOI: https://doi.org/10.1007/978-0-387-74938-9_7
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-74937-2
Online ISBN: 978-0-387-74938-9
eBook Packages: EngineeringEngineering (R0)