Efficient Group Key Management using Symmetric Key and Threshold Cryptography for Cluster based Wireless Sensor Networks

Full Text (PDF, 507KB), PP.9-18

Views: 0 Downloads: 0

Author(s)

Abdoulaye Diop 1,* Yue Qi 1 Qin Wang 1

1. University of Science and Technology Beijing, School of Computer and Communication Engineering, Beijing, China

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2014.08.02

Received: 22 Dec. 2013 / Revised: 21 Mar. 2014 / Accepted: 13 May 2014 / Published: 8 Jul. 2014

Index Terms

Wireless Sensor Network, Symmetric Key Management, Security, Attacks, Cluster

Abstract

Research in Wireless Sensor Networks (WSNs) has made a significant progress recently, especially the area of key management, which plays a central role for protecting group communication in sensor networks. In sensor networks, the data are crucial and have to keep secrecy in data communication. To achieve data confidentiality, adversary should not have access to the group communication. Therefore due to the limited memory resources and energy constraints of sensor nodes, reducing the communication and storage overhead, and improving the resilience against the node capture attack become a must.

In this paper we propose An Efficient Group Key Management using Symmetric Key and Threshold Cryptography for Cluster based Wireless Sensor Networks (EGKMST). The proposed scheme considers a hierarchical cluster structure of sensor network and adopts the pair-wise key management and group key management based on threshold key cryptography to generate and to distribute the keys efficiently within a cluster and updates periodically keys. By this way EGKMST provides continuous transmission security and avoids dangerous attacks from malicious nodes and mitigate the node compromise attack in WSNs communication. The security and performance analysis illustrate that EGKMST scheme achieves the requirement of group communication and provides efficient security with low communication cost, low memory overhead and energy saving compared with some existing key management schemes.

Cite This Paper

Abdoulaye Diop, Yue Qi, Qin Wang, "Efficient Group Key Management using Symmetric Key and Threshold Cryptography for Cluster based Wireless Sensor Networks", International Journal of Computer Network and Information Security(IJCNIS), vol.6, no.8, pp.9-18, 2014. DOI:10.5815/ijcnis.2014.08.02

Reference

[1]J. Zhang, V. Varadharajan, "Wireless sensor network key management survey and taxonomy," Journal of Network and Computer Applications, vol. 33, no. 2, 2010, pp. 63-75.
[2]W. Heinzelman, A. Chandrakasan and H. Balakrishnan, "Energy-efficient communication protocol for WSNs," in Proc. of the 33rd Hawaii International Conference on System Sciences, 2000, Washington.
[3]K. Zhang, C. Wang, and C. Wang, "A secure routing protocol for cluster-based wireless sensor networks using group key management," In Proc. 4th IEEE International conference on Wireless Communications, Networking and Mobile Computing (WiCOM'08), 2008, pp. 1-5.
[4]T. Lalitha and R. Umarani, "Energy efficient Cluster Based Key Management Technique for Wireless Sensor Network," International Journal of Advances in Engineering & Technology (IJAET), Vol. 3 No. 1, 2012, pp. 186-190.
[5]J. Ibriq and I. Mahgoub, "A secure hierarchical routing protocol for wireless sensor networks," In: Proc. 10th IEEE International Conference on Communication Systems, 2006, pp. 1-6.
[6]L. B. Oliveira, A. Ferreira, M. A. Vilaca, H. C. Wong, M. Bern, R. Dahab, and A. A. F. Loureiro, "Secleach-on the security of clustered sensor networks," Signal Processing, Vol. 87, No. 12, 2007, pp. 2882-2895.
[7]A. C. Ferreira, M. A. Vilaca, L. B. Oliveira, E. Habib, H. C. Wong, and A. A. Loureiro, "On the security of cluster-based communication protocols for wireless sensor networks," In Proc. 4th IEEE International Conference on Networking (ICN?05), 2005, pp. 449-458.
[8]D. Wu, G. Hu, and G. Ni, "Research and improve on secure routing protocols in wireless sensor networks," in 4th IEEE International Conference on Circuits and Systems for Communications (ICCSC 2008), 2008, pp. 853-856.
[9]I. S. Gawdan, C. O. Chow, T. A. Zia, Q. I. Sarhan, "A Novel Secure Key Management for Hierarchical Wireless Sensor Networks," in Proceeding of 2011 Third Conference on Computational Intelligence, Modeling and Simulation (CIMSiM), 2011 , pp. 312 - 316.
[10]A Diop, Y. Qi, Q. Wang, S. Hussain,"An Advanced Survey on Secure Energy-Efficient Hierarchical Routing Protocols in Wireless Sensor Networks", in International Journal of Computer Science Issues (IJCSI), Jan2013. Vol. 10 Issue 1: pp 490.
[11]Y. Cheng and D. Agrawal, "An improved key distribution mechanism for large-scale hierarchical wireless sensor networks," Ad Hoc Networks (Elsevier), vol. 5, no. 1, 2007 pp. 35-48.
[12]A. Shamir, "How to share a secret," Communications of the ACM, vol. 22, no. 11, 1979, pp. 612-613.
[13]A.Chadha, Y.Liu, and S.Das, "Group key distribution via local collaboration in wireless sensor netwroks," in Proc. IEEE Sensor and Ad Hoc communications and Networks, 2005, pp. 46-54.
[14]M. Tubaishat, J. Yin, B. Panja, and S. Madria, "A secure hierarchical model for sensor network," ACM SIGMOD Record, Vol. 33, No. 1, 2004, pp. 7-13.
[15]J. Yin and S. Madria, "SecRout: A Secure Routing Protocol for Sensor Network," in IEEE 20th International Conference on Advanced information networking and applications, Vol. 1, 2006.
[16]G. Jolly, M.C. Kuscu, P. Kokate, M. Yuonis, "A low-energy management protocol for wireless sensor networks", in: Proceedings of the Eighth IEEE International Symposium on Computers and Communication (ISCC'03), Kemer Antalya, Turkey, June 30-July 3, 2003.
[17]A Diop, Y. Qi, Q. Wang "An Improved Key Management Scheme for Hierarchical Wireless Sensors Networks," in TELKOMNIKA Indonesian Journal of Electrical Engineering Science, vol. 12, 2014, pp 3969-3978.
[18]L. Eschenauer and V. D. Gligor, "A key management scheme for distributed sensor networks," in Proc. of the 9th ACM conference on Computer and communications security, New York, 2002, pp. 41-47.
[19]H. Chan, A. Perrig and D. Song, "Random key pre-distribution schemes for sensor networks," in Proc. of the 2003 IEEE Symposium on Security and Privacy, Washington, 2003, pp. 197-213.
[20]S. Zhu, S. Setia and S. Jajodia, "LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks," in Proceedings of the 10th ACM conference on Computer and communications security, New York, 2003, pp. 62-72.
[21]Y. Zhang, Y Shen and S. Lee, "A Cluster-Based Group Key Management Scheme for Wireless Sensor Networks" In: Proc. 12th IEEE International Asia-Pacific Web Conference, 2010.
[22]P. Banerjee, D. Jacobson and S. N. Lahiri, "Security and performance analysis of a secure clustering protocol for sensor networks," in Proc. 6th IEEE Intl. Symposium on Network Computing and Applications, 2007, pp.145-152.
[23]D. Liu and P. Ning, "Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks," in Proc. of the 10th Annual Network and Distributed System Security Symposium, California, 2003.
[24]P. K. Sahoo, J. J. Chen, P.i Sun. "Efficient security mechanisms for the distributed wireless sensor networks". Proceedings of the IEEE Third International Conference on Information Technology and Applications (ICITA'05). (2): 2005, 541-546.
[25]F. Kausar, A. Masood and S. Hussain, "An Authenticated Key Management Scheme for Hierarchical Wireless Sensor Networks," in Advances in Communication Systems and Electrical Engineering, Lecture Notes in Electrical Engineering, Vol. 4, 2008, pp. 85-98.
[26]H Bawa, P. Singh, R. Kumar "An Authenticated Key Management Scheme for Enhancing User Authentication in A WSN" in I. J. Computer Network and Information Security, Vol. 5(1), 2013, pp. 56-64.
[27]I S. Abuhaiba and H B. Hubboub" Reinforcement Swap Attack against Directed in Wireless Sensor Networks" in I. J. Computer Network and Information Security, Vol. 5(3), 2013, pp. 13-24.
[28]A. Modirkhazeni, N. Ithnin and O. Ibrahim, "Empirical Study on Secure Routing Protocols in Wireless Sensor Networks" International Journal of Advancements in Computing Technology, vol. 2(5), pp. 25-41, 2010.
[29]M A. Simplicio, P M. Barreto, C B. Margi, T B. Carvalho, "A survey on key management mechanisms for distributed Wireless Sensor Networks" Journal of Computer Networks, vol. 54 , pp 2591-2612, 2010.
[30]J. Zhang, V. Varadharajan, "Group-based Wireless Sensor Network Security Scheme, " In The fourth international conference on wireless and mobile communications (ICWMC 2008), 2008.
[31]A. Diop, Y. Qi, Q. Wang, "A Novel Key Management Scheme for Cluster Based Wireless Sensors Networks", In Advanced Materials Research, vol.846-847, 2014, pp. 864-847.
[32]C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures", In Proceedings of First IEEE International Workshop on Sensor Network Protocols and Applications, 2003, pp. 113-127.
[33]Y. Zhang, C. Wu, J. Cao and X. Li "A Secret Sharing-Based Key Management in Hierarchical Wireless Sensor Network", Hindawi Publishing Corporation International Journal of Distributed Sensor Networks, vol. 2013, pp. 1-7.
[34]Y. Y. Zhang, X. Z. Li, J. M. Liu, J. C. Yang, and B. J. Cui,
"A secure hierarchical key management scheme in wireless
sensor network," The International Journal of Distributed Sensor Networks, vol. 2012,Article ID 547471, 8 pp, 2012.
[35]Harn L, Lin C," Authenticated group key transfer protocol based on secret sharing", In Proceedings IEEE Trans. Comput, 2010, vol. 59 (6), pp, 842–846.
[36]D. Xu, J. Huang, J. Dwoskin, M. Chiang, and R. B. Lee, "Re-examining probabilistic versus deterministic key management," in IEEE ISIT, June 2007, pp. 2586-2590M. [Young, The Technical Writer's Handbook. Mill Valley, CA: University Science, 1989].