Abstract
Focusing on a large-scale wireless sensor network with multiple base stations (BS), a key management protocol is designed in this paper. For securely relaying data between a node and a base station or two nodes, an end-to-end data security method is adopted by this protocol. Further employing a distributed key revocation scheme to efficiently remove compromised nodes then forms our key management protocol celled multi-BS key management protocol (MKMP). Through performance evaluation, we show that MKMP outperforms LEDS Ren et al. (IEEE Trans Mobile Comput 7(5):585–598, 2008) in terms of efficiency of resilience against the node capture attack. With the analysis of key storage overheads, we demonstrate that MKMP performs better than mKeying Wang et al. (A key management protocol for wireless sensor networks with multiple base stations. In: Procceedings of ICC'08, pp 1625–1629, 2008) in terms of this overhead.
Similar content being viewed by others
Notes
The distance here means the Euclidean distance which can be obtained with the aid of coordinates.
The BS in this sentence is applicable for any BS, say BS i.
Here, the key revocation concerns the shared key revocation rather than the public key revocation.
References
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102–114.
Blom, R. (1984, April). An optimal class of symmetric key generation systems. In Proceedings of EUROCRYPT’84, pp. 335–338.
Blundo, C., Santis, A. D., Herzberg, A., Kutten, S., Vaccaro, U., & Yung, M. (1992, August). Perfectly-secure key distribution for dynamic conferences. In Proceedings of international cryptology conference’92, pp. 471–486.
Capkun, S., Buttyan, L., & Hubaux, J.P. (2003). Self-organized public-key management for mobile ad hoc networks. IEEE Transactions Mobile Computing, 2(1), 52–64.
Capkun, S., & Hubaux, J. P. (2006). Secure positioning in wireless networks. IEEE Journal on Selected Areas in Communications, 24(2), 221–232.
Carman, D. W., Kruus, P. S., & Matt, B. J. (2000, September). Constraints and approaches for distributed sensor network security. NAI labs technical report.
Chan, H., Perrig, A., & Song, D. (2003, May). Random key pre-distribution schemes for sensor network. In Proceedings of IEEE symposium on security and privacy’03, pp. 197–213.
Chan, H., Gligor, V. D., Perrig, A., & Muralidharan, G. (2005). On the distribution and revocation of cryptographic keys in sensor networks. IEEE Transactions on Dependable and Secure Computing, 2(3), 233–247.
Chan, A. C. F. (2004, March). Distributed symmetric key management for mobile ad hoc networks. In Proceedings of IEEE INFOCOM’04, pp. 2414–2424.
Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys and Tutorials, 11(2), 52–73.
Diffie, W., & Hellman, M. E. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.
Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J., & Khalili, A. (2005). A pairwise key pre-distribution scheme for wireless sensor networks. ACM Transactions on Information and System Security, 8(2), 228–258.
Eschenauer, L., & Gligor, V. D. (2002, November). A key management scheme for distributed sensor networks. In ACM conference on computer and communications security’02, pp. 41–47.
Gandham, S. R., Dawande, M., Prakash, R., & Venkatesan, S. (2003). Energy efficient schemes for wireless sensor networks with multiple mobile base stations. In Proceedings of globecom’03, pp. 377–381.
Goldreich, O. (2000). Foundations of cryptography: Basic tools. New York: Cambridge University Press.
Lazos, L., & Poovendran, R. (2004, October). Serloc: Secure range-independent localization for wireless sensor networks. In Proceedings of ACM international conference mobile computing and networking’04.
Lee, J. C., Leung, V. C. M., Wong, K. H., Cao, J., & Chan, H. C. B. (2007). Key management issues in wireless sensor networks: Current proposals and future developments. IEEE Wireless Communications, 14(5), 76–84.
Merkle, R. (1980, April). Protocols for public key cryptosystems. In Proceedings of IEEE symposium research in security and Privacy’80, pp. 122–134.
Neuman, B. C., & Tso, T. (1994). Kerberos: An authentication service for computer networks. IEEE Communications Magazine, 32(9), 33–38.
Oyman, E. I., & Ersoy, C. (2004). Multiple sink network design problem in large scale wireless sensor networks. In Proceedings of IEEE ICC’04, pp. 3663–3667.
Pathak, V., Yao, D., & Iftode, L. (2008, September). Securing location aware services over VANET using geographical secure path routing. In Proceedings of IEEE ICVES’08, pp. 346–353.
Perrig, A., Szewczyk, R., Wen, V., Cullar, D., & Tygar, J. D. (2001, July). SPINS: Security protocols for sensor networks. In Proceedings of ACM/IEEE international conference on mobile computing and networking’01, pp. 189–199.
Peters, B., Smith, J., Medeiros, O., & Rohrer, M. (2001). ‘Improving simulation model adaptability with a production control framework. In Proceedings of simulation conference’01.
Ren, K., Lou, W., & Zhang, Y. (2008). LEDS: Providing location-aware end-to-end data security in wireless sensor networks. IEEE Transactions on Mobile Computing, 7(5), 585–598.
Rivest, R. L., Shamir, A., & Adleman, L. M. (1978). A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21(2), 120–126.
Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11), 612–613.
Wang, Y., Ramamurthy, B., & Xue, Y. (2008, May). A key management protocol for wireless sensor networks with multiple base stations. In Proceedings of ICC’08, pp. 1625–1629.
Yang, H., Ye, F., Yuan, Y., Lu, S., & Arbaugh, W. (2005). Toward resilient security in wireless sensor networks. In Proceedings of ACM MobiHoc’05.
Ye, F., Luo, H., Cheng, J., Lu, S., & Zhang, L. (2002, September). A two-tier data dissemination model for large-scale wireless sensor networks. In Proceedings of ACM MOBICOM’02.
Ye, F., Luo, H., Lu, S., & Zhang, L. (2004, March). Statistical en-route filtering of injected false data in sensor networks. In Proceedings of IEEE INFOCOM’04.
Ye, F., Lu, S., & Zhang, L. (2005). Gradient broadcast: A robust data delivery protocol for large scale sensor networks. Wireless Networks’, 05(11(3), 285–298.
Zhang, Y., Liu, W., Fang, Y., & Wu, D. (2006). Secure localization and authentication in ultra-wideband sensor networks. IEEE J. Selected Areas Comm., 24(4), 829–835.
Zhou, Y., Zhang, Y., & Fang, Y. (2008). Securing wireless sensor networks: a survey. IEEE Communications Surveys and Tutorials, 10(3), 6–28.
Zhu, S., Setia, S., & Jajodia, S. (2003, October). LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of ACM conference on computer and communications security’03, pp. 62–72.
Zhu, S., Setia, S., Jajodia, S., & Ning, P. (2004, May). An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In Proceedings of IEEE symposium security and privacy’04.
Zhu, S., Setia, S., & Jajodia, S. (2006) LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks 2(4):500–528.
Acknowledgments
The work of H.W. Ferng was supported by the National Science Council (NSC), Taiwan under contracts NSC 101-2221-E-011-109 and NSC 102-2221-E-011-004.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ferng, HW., Nurhakim, J. & Horng, SJ. Key management protocol with end-to-end data security and key revocation for a multi-BS wireless sensor network. Wireless Netw 20, 625–637 (2014). https://doi.org/10.1007/s11276-013-0627-4
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-013-0627-4