Localization-Based Clustered Key Management in Wireless Sensor Network

Article Preview

Abstract:

Wireless Sensor Networks (WSNs) are usually subjected to numerous threats and vulnerable to various attacks. Generally, the key management is considered to be the prerequisite for secure communication in WSNs. In this paper, we present a Localization-based Clustered Key Management (LCKM) which can efficiently enhance the network security and survivability for the clustered heterogeneous networks. LCKM utilizes the seeds to rekey and then localize the key materials, which protects the network from the compromised nodes by reducing the probability of the common key. The security analysis proves that LCKM can prevent more attacks than other protocols.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 482-484)

Pages:

252-255

Citation:

Online since:

February 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Yun Zhou, "Securing Wireless sensor networks: A Survey" IEEE Communications Surveys & Tutorials, 3rd Quarter 2008.

Google Scholar

[2] Banihashemian, A. Ghaemi Bafghi, "A new key management scheme in heterogeneous wireless sensor networks", in proceeding ICACT 2010, Korea, 2010.

Google Scholar

[3] F. Anjum, "Location dependent key management in sensor networks using without using deployment knowledge", in: Proceedings of WiSe'06.

Google Scholar

[4] X. Du, Y. Xiao, M. Guizani, and H.-H. Chen. "An effective key management scheme for heterogeneous sensor networks", Ad Hoc Networks, 5(1):24–34, 2007.

DOI: 10.1016/j.adhoc.2006.05.012

Google Scholar

[5] Saber Banihashemian,Abbas Ghaemi Bafghi,"Alternative shared key replacement in heterogeneous wireless sensor networks". In proceeding IEEE computer society, (2010)

DOI: 10.1109/cnsr.2010.46

Google Scholar

[6] Mark Luk, Ghita Mezzour, Adrian Perrig, and Virgil Gligor. "MiniSec: A Secure Sensor Network Communication Architecture." In Proceedings of the Sixth International Conference on Information Processing in Sensor Networks (IPSN 2007), April 2007.

DOI: 10.1145/1236360.1236421

Google Scholar

[7] ZHU, S., SETIA, S., AND JAJODIA, S. "LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks". ACM Transactions on Sensor Networks, Vol. 2, No. 4, November 2006, Pages 500–528.

DOI: 10.1145/1218556.1218559

Google Scholar

[8] Ameer Ahmed Abbasi, Mohamed Younis, "A survey on clustering algorithms for wireless sensor networks", Computer Communications 30 (2007) 2826–2841.

DOI: 10.1016/j.comcom.2007.05.024

Google Scholar