Abstract
Wireless Sensor Networks (WSNs) are often deployed in hostile environments, which make such networks highly vulnerable and increase the risk of attacks against this type of network. WSN comprises of large number of sensor nodes with different hardware abilities and functions. Due to the limited memory resources and energy constraints, complex security algorithms cannot be used in sensor networks. Therefore, it is necessary to well balance between the security level and the associated energy consumption overhead to mitigate the security risks. In this paper, we present an Efficient and Secure Session Key Management Scheme for Cluster-Based Wireless Sensors Networks (ESSKM). The proposed technique based on symmetric key mechanism, provides an improved session key establishment by updating periodically the session key within a cluster, hence avoids different type of attacks from malicious nodes and mitigates the node compromise attack. Finally, through the network simulator tool (NS-2), the security analysis and performance simulation demonstrate that ESSKM not only achieves efficient security, but also provides energy saving with low storage overhead.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Zhang, J., Varadharajan, V.: Wireless sensor network key management survey and taxonomy. Journal of Network and Computer Applications 33(2), 63–75 (2010)
Heinzelman, W., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for WSNs. In: Proc. of the 33rd Hawaii International Conference on System Sciences, Washington (2000)
Modirkhazeni, A., Ithnin, N., Ibrahim, O.: Empirical Study on Secure Routing Protocols in Wireless Sensor Networks. International Journal of Advancements in Computing Technology 2(5), 25–41 (2010)
Lee, J., Leung, V., Wong, K., Cao, J., Chan, H.: Key management issues in wireless sensor networks: current proposals and future developments. IEEE Wireless Communications 14(5), 76–84 (2007)
Otway, D., Rees, O.: Efficient and Timely Mutual Authentication. Operating Systems Review 21, 8–10 (1987)
Zhu, S., Setia, S., Jajodia, S.: LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. In: Proceedings of the 10th ACM Conference on Computer and Communications Security, New York, pp. 62–72 (2003)
Cheng, Y., Agrawal, D.: An improved key distribution mechanism for large-scale hierarchical wireless sensor networks. Ad Hoc Networks (Elsevier) 5(1), 35–48 (2007)
Oliveira, L.B., Ferreira, A., Vilaca, M.A., et al.: SecLEACH-on the security of clustered sensor networks. Signal Processing 87(12), 2882–2895 (2007)
Banerjee, P., Jacobson, D., Lahiri, S.N.: Security and performance analysis of a secure clustering protocol for sensor networks. In: Proc. 6th IEEE Intl. Symposium on Network Computing and Applications, pp. 145–152 (2007)
Ferreira, A.C., Vilaca, M.A., Oliveira, L.B., Habib, E., Wong, H.C., Loureiro, A.A.: On the security of cluster-based communication protocols for wireless sensor networks. In: Proc. 4th IEEE International Conference on Networking (ICNŠ05), pp. 449–458 (2005)
Chen, J.J.-R., Sahoo, P.K., Sun, P.-T.: Efficient security mechanisms for the distributed wireless sensor networks. In: Proceedings of the IEEE Third International Conference on Information Technology and Applications (ICITA 2005), vol. 2, pp. 62–72 (2005)
Liu, D., Ning, P.: Efficient distribution of key chain commitments for broadcast authentication in distributed sensor networks. In: Proc. of the 10th Annual Network and Distributed System Security Symposium, California (2003)
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: Attacks and countermeasures. In: Proceedings of First IEEE International Workshop on Sensor Network Protocols and Applications, pp. 113–127 (2003)
NS-2 web site, http://www.isi.edu/nsnam/ns
Daemen, J., Rijmen, V.: The Design of Rijndael: AES - the Advanced Encryption Standard. Springer-Verlag New York (2002)
Cam, H., Ozdemir, S., Nair, P., Muthuavinashiappan, D., Sanli, H.O.: Energy-efficient secure pattern based data aggregation for wireless sensor networks. Computer Communications 29(4), 446–455 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Diop, A., Qi, Y., Wang, Q. (2014). An Efficient and Secure Session Key Management Scheme for Cluster Based Wireless Sensors Networks. In: Zu, Q., Vargas-Vera, M., Hu, B. (eds) Pervasive Computing and the Networked World. ICPCA/SWS 2013. Lecture Notes in Computer Science, vol 8351. Springer, Cham. https://doi.org/10.1007/978-3-319-09265-2_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-09265-2_5
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-09264-5
Online ISBN: 978-3-319-09265-2
eBook Packages: Computer ScienceComputer Science (R0)