Energy Efficient Key Management Scheme for Wireless Sensor Networks
AbstractA Wireless Sensor Network (WSN) is composed of a large number of sensor nodes deployed over a geographical area. Each node is a low-power device that integrates computing, wireless communication, and sensing abilities. Many applications that make use of sensor networks require secure communication. Designing an efficient key establishment scheme is of great importance to the data security in Wireless Sensor Networks. The traditional cryptographic techniques are impractical in Wireless Sensor Networks because of associated high energy and computational overheads.This algorithm supports the establishment of three types of keys for each sensor node, an individual key shared with the base station, a pair wise key shared with neighbor sensor node, and a group key that is shared by all the nodes in the network. The algorithm used for establishing and updating these keys are energy efficient and minimizes the involvement of the base station. Polynomial function is used in the study to calculate the keys during initialization, membership change and key compromise. Periodically the key will be updated. To overcome the problem of energy insufficiency and memory storage and to provide adequate security, the energy efficient scheme is proposed. It works well in undefined deployment environment. Unauthorized nodes should not be allowed to establish communication with network nodes. This scheme when compared with other existing schemes has a very low overhead in computation, communication and storage.
 Messai,L.; Aliouat,M.; Seba,H.; Tree Based Protocol for Key Management in Wireless Sensor Networks, EURASIP J.on Wireless Communications and Networking, Article ID 910695, DOI:10.1155/2010/910695, 2010.
 Xing Zhang; Jingsha He; QianWei; EDDK: Energy-Efficient Distributed Deterministic Key Management for Wireless Sensor Networks, EURASIP J. on Wireless Communications and Networking, Article ID 765143, DOI:10.1155/2011/765143, 2011.
 Eltoweissy,M.; Moharrum,M.; Mukkamala,R.; Dynamic key management in sensor networks, IEEE Communications Magazine, 44(4):122- 130, 2006.
 Du,W.; Deng,J.; Han,Y.S.; Varshney,P.K.; Katz,J.; Khalili,A.; A pairwise key predistribution scheme for wireless sensor networks, ACM Trans. on Information and System Security, 8(2):228-258, 2005.
 Jen Yan Huang; I-En Liao; Hao-Wen Tang; A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks, EURASIP J. on Wireless Communications and Networking, Article ID 296704, DOI:10.1155/2011/296704, 2011.
 Eschenauer,L.; Gligor,V.D.(2002); A key-management scheme for distributed sensor networks, Proc. of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, 41-47, 2002.
 Chan,H.; Perrig,A.; Song, D.; Randomkey predistribution schemes for sensor networks, Proc. of IEEE Symposium on Security And Privacy, 197-213, 2003.
 Liu,D.; Ning, P.; Establishing pairwise keys in distributed sensor networks,Proc. of the 10th ACM Conference on Computer and Communications Security (CCS 03), Washington, DC, USA, 52-61, 2003.
 Sencun Zhu; Sanjeev Setia; Sushil Jajodia (2003);
LEAP: Efficient Security Mechanisms for Large Scale Distributed Sensor Networks, Proc. of the 10th ACM Conference on Computer and Communications Security, pp.62-72.
 Du,W.; Deng,J.; Han,Y.S.; Chen,S.; Varshney,P.; A Key Management Scheme for Wireless Sensor Networks Using Deployment Knowledge, Proc. IEEE INFOCOM04, 586-597, 2004.
 Kausar,F.; Hussain,S.; Yang,L.T.; Masood,A.; Scalable and efficient key management for heterogeneous sensor networks, J. of Supercomputing, 45(1):44-65, 2008.
 Xiao,Y.; Rayi,V.K.; Sun,B.; Du,X.; Hu,F.; Galloway,M.; A survey of key management schemes in wireless sensor networks,J. of Computers Communications, 30(11-12):2314-2341, 2007.
 Du,X.; Xiao, Y.; Guizani, M.; Chen,H.H.; An effective key management scheme for heterogeneous sensor networks, J. of Ad Hoc Networks, 5(1):24-34, 2007.
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
ONLINE OPEN ACCES: Acces to full text of each article and each issue are allowed for free in respect of Attribution-NonCommercial 4.0 International (CC BY-NC 4.0.
You are free to:
-Share: copy and redistribute the material in any medium or format;
-Adapt: remix, transform, and build upon the material.
The licensor cannot revoke these freedoms as long as you follow the license terms.
DISCLAIMER: The author(s) of each article appearing in International Journal of Computers Communications & Control is/are solely responsible for the content thereof; the publication of an article shall not constitute or be deemed to constitute any representation by the Editors or Agora University Press that the data presented therein are original, correct or sufficient to support the conclusions reached or that the experiment design or methodology is adequate.