A New Key Management Protocol for Multiphase Hierarchical Wireless Sensor Network

Article Preview

Abstract:

In the LEAP (Localized Encryption and Authentication Protocol), disclosure of the initial key will threaten the security of the entire network. B.Tian and his fellows improved the LEAP and diminished the threat. They reduced the number of exposed communication keys resulted from the disclosure of the initial key. In this paper, we show the deficiency of the improved protocol put forward by B.Tian et al and propose a new key management protocol for multiphase hierarchical WSN (NPMHW) . NPMHW designs a special method to establish the key ring by using random numbers and the HASH function. It also introduces a mechanism to detect whether the node is captured or not. Analysis indicates that, compared with B.Tian’s protocol, NPMHW localized the threat and greatly reduced the number of the exposed communication keys caused by the disclosure of the initial key. Therefore, the protocol raised in this paper is much safer.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

242-246

Citation:

Online since:

February 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Sun Li-min, Li Jian-zhong, Chen Yu: Wireless sensor network (Tsinghua University Press, Beijing 2005).

Google Scholar

[2] Laurent Eschenauer, Virgil D. Gligor: A key management scheme for distributed sensor networks. Proceedings of the 9th ACM Conference on Computer and Communication Security, 41-47 (2002).

DOI: 10.1145/586110.586117

Google Scholar

[3] S. Zhu,S. Setia, S. Jajodia. LEAP: Efficient security mechanisms for large-scale distributed sensor networks. Proceedings of the10th ACM Conference on Computer and Communications Security (CCS2003). Washington: ACM Press, 62-72 (2003).

DOI: 10.1145/948109.948120

Google Scholar

[4] J. Jang, T. Kwon, J. Song: A time-based key management protocol for wireless sensor networks. Information Security Practice and Experience, 314-328 (2007).

DOI: 10.1007/978-3-540-72163-5_24

Google Scholar

[5] B. Tian, S. Han, S. Parvin, T.S. Dillon: A key management protocol for multiphase hierarchical wireless sensor networks. The IEEE/IFIP International Symposium on Trusted Computing and Communications, Hongkong, China, 617–623 (2010).

DOI: 10.1109/euc.2010.99

Google Scholar

[6] Qinghua Zhang, Pan Wang, Reeves, D. S, Peng Ning: Defending against Sybil attacks in sensor networks. Proceedings of the 25th IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW'05), Washington, DC, USA, IEEE Computer Society: 185-191 (2005).

DOI: 10.1109/icdcsw.2005.57

Google Scholar