An Improved Cluster Key Management Algorithm for Wireless Sensor Networks

Article Preview

Abstract:

The information security of wireless sensor networks is one of hot issues on the current research; this paper combines threshold key scheme with the management of security key sharing and group agreement and proposes dynamic key management scheme through clustering level key matrix of authentication mechanism from the cluster to node. The network is divided into different clusters, and the cluster head conducts the key authentication exchange and updates the key management with threshold key schemes, with no need of third authentication center, reduces the computing and communication costs, and promotes communication.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 998-999)

Pages:

1092-1095

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, Wireless sensor networks: a survey;, Computer Networks, pp.393-433, Elsevier, (2002).

DOI: 10.1016/s1389-1286(01)00302-4

Google Scholar

[2] Pamo B, Perrig A,Gligor V. Distributed detection of node replication attacks in sensor networks.In Proc. of the IEEE Symp. On Security and Privacy. IEEE Computer Society, 2005. 49-63.

DOI: 10.1109/sp.2005.8

Google Scholar

[3] A. Perrig, R. Szewczyk. et al. SPINS: Security protocols for sensor networks. Wireless Networks, 2002, 8(5): 521~534.

Google Scholar

[4] D.G. Liu,P. Ning . Multi-Level μTESLA: A Broadcast Authentication System for Distributed Sensor Networks, ACM(TECS), 2004, 3(4): 800-836.

DOI: 10.1145/1027794.1027800

Google Scholar

[5] H. Chan, A. Perrig, D. Song. Key distribution techniques for sensor networks. Wireless Networks, 2004, 6(2): 277~303.

DOI: 10.1007/1-4020-7884-6_13

Google Scholar

[6] Shen Yu Long, Pei Qing qin. MMμTESLA: Broadcast authentication protocol for multiple-base-station sensor networks[J]. Chinese Journal of Computer. 2007. 4: 539-547.

Google Scholar

[7] Sun Qian. A Novel Key Pre-distribution for Wireless Sensor Networks. Physics Procedia 25 ( 2012 ) 2183 – 2189.

DOI: 10.1016/j.phpro.2012.03.368

Google Scholar

[8] L.L. Si, Zhigang Ji. The Application of Symmetric Key Cryptographic Algorithms in Wireless Sensor Networks. Physics Procedia 25 ( 2012 ) 552-559.

DOI: 10.1016/j.phpro.2012.03.125

Google Scholar

[9] Du W.L., Deng J., et al. A key management scheme for wireless sensor networks using deployment knowledge[C]. The 23th IEEE Computer and Communications Proceedings 2004. 586-597.

Google Scholar

[10] Levi A, Tasc S E. et al. Simple extensible and flexible reandom key predistribution schemes for wireless sensor networks using reusable key pools[J]. Journal of Interlligent Manufacturing, 2009. 21(5): 625-645.

DOI: 10.1007/s10845-009-0256-z

Google Scholar

[11] Jaworski J, Ren M, and Rybarczyk K. Random key redistribution for wireless sensor networks using deployment knowledge [J]. Computing, 2009, 85(1-2): 57-76.

DOI: 10.1007/s00607-009-0036-9

Google Scholar

[12] Liu wei, Luo rong. A Lightweight Key Establishment Protocol for Wireless Sensor Networks[J]. Journal of Electronics&Information Technology. 2010(32): 869-874.

DOI: 10.3724/sp.j.1146.2009.00349

Google Scholar

[13] Liu Y.N., Wang J. et al. Threshold key sharing Model in wireless sensor networks[J]. Journal of Electronics Information Technology. 2011(33): 1913-(1919).

DOI: 10.3724/sp.j.1146.2010.01155

Google Scholar

[14] Wen T., Zhang Y. et al. Dynamic group key management scheme for homogeneous wireless sensor networks[J]. Journal on Communications, 2012(33): 164-172.

Google Scholar

[15] Paek K, Song U, Kim H, Kim J. Energy-efficient key-management (EEKM) protocol for large-scale distributed sensor networks. Journal of Information Science and Engineering 2008; 24: 1837–58.

Google Scholar

[16] Xiaobing He, Michael Niedermeier Dynamic key management in wireless sensor networks: A survey. Journal of Network and Computer Applications 2013 (36) 611–622.

DOI: 10.1016/j.jnca.2012.12.010

Google Scholar