A Lightweight Key Management Protocol for Hierarchical Sensor Networks

Article Preview

Abstract:

Key Management is a fundamental security service in distributed sensor networks. The focus of this paper is to design a lightweight group key management scheme to safeguard the data packet passing on the sensor networks under different types of attacks. We propose an energy efficient level-based hierarchical system and build the secure route from the source node to sink node .We compromise between the energy consumption and the shortest path by utilizing the number of neighbors of a sensor when renewing a cluster head or choosing the next hop in the hierarchical clusters. In addition, our protocol contains group communication policies, group membership require-ments and an algorithm for generating a distributed group key for secure communication.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

257-260

Citation:

Online since:

July 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] A. Perrig,R. Szewczyk,V. Wen,D. Culler, J.D. Tygar, SPINS: security protocols for sensor networks[J]. Wireless Networks 8 (2002): 521-534.

DOI: 10.1023/a:1016598314198

Google Scholar

[2] H. Chan, A. Perrig, D. Song, Random key pre- distribution schemes for sensor networks, in: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, 11-14 May 2003, 197-213.

Google Scholar

[3] Joengmin Hwang, Yongdae Kim, Revisiting random key pre-distribution schemes for wireless sensor networks, in: Proc. ACM Workshop Secur. Ad Hoc Sens. Netw. SASN'04. NY: ACM Press, 2004, 43-52.

DOI: 10.1145/1029102.1029111

Google Scholar

[4] Lidong Zhou, Zygmunt J Hass, Securing ad hoc networks[J], IEEE Networks Special Issue on Network Security, 1999, 13(6): 24-30.

DOI: 10.1109/65.806983

Google Scholar

[5] Jean-Pierre Hubaux, Levente Butyan, Srdjan capkun, The quest for security in mobile Ad Hoc networks[A]. Proc of the 2001 ACM International Symposium on Mobile ad hoc networking & computing 2001[c], Long Beach, CA, US2001, 146-155.

DOI: 10.1145/501416.501437

Google Scholar

[6] Panagiotis Papadimitratos, Zygmunt J. Haas, Secure message transmission in mobile ad hoc networks, Ad Hoc Networks 1 (2003): 193-209.

DOI: 10.1016/s1570-8705(03)00018-0

Google Scholar

[7] W. Diffie and M. E. Hellman. Privacy and Authentication: An Introduction to Cryptography. Proceedings of the IEEE, March 1979, 67(3): 397-427.

DOI: 10.1109/proc.1979.11256

Google Scholar