Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Key management protocol with end-to-end data security and key revocation for a multi-BS wireless sensor network

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Focusing on a large-scale wireless sensor network with multiple base stations (BS), a key management protocol is designed in this paper. For securely relaying data between a node and a base station or two nodes, an end-to-end data security method is adopted by this protocol. Further employing a distributed key revocation scheme to efficiently remove compromised nodes then forms our key management protocol celled multi-BS key management protocol (MKMP). Through performance evaluation, we show that MKMP outperforms LEDS Ren et al. (IEEE Trans Mobile Comput 7(5):585–598, 2008) in terms of efficiency of resilience against the node capture attack. With the analysis of key storage overheads, we demonstrate that MKMP performs better than mKeying Wang et al. (A key management protocol for wireless sensor networks with multiple base stations. In: Procceedings of ICC'08, pp 1625–1629, 2008) in terms of this overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Notes

  1. The distance here means the Euclidean distance which can be obtained with the aid of coordinates.

  2. The BS in this sentence is applicable for any BS, say BS i.

  3. Here, the key revocation concerns the shared key revocation rather than the public key revocation.

References

  1. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). A survey on sensor networks. IEEE Communications Magazine, 40(8), 102–114.

    Article  Google Scholar 

  2. Blom, R. (1984, April). An optimal class of symmetric key generation systems. In Proceedings of EUROCRYPT’84, pp. 335–338.

  3. Blundo, C., Santis, A. D., Herzberg, A., Kutten, S., Vaccaro, U., & Yung, M. (1992, August). Perfectly-secure key distribution for dynamic conferences. In Proceedings of international cryptology conference’92, pp. 471–486.

  4. Capkun, S., Buttyan, L., & Hubaux, J.P. (2003). Self-organized public-key management for mobile ad hoc networks. IEEE Transactions Mobile Computing, 2(1), 52–64.

    Article  Google Scholar 

  5. Capkun, S., & Hubaux, J. P. (2006). Secure positioning in wireless networks. IEEE Journal on Selected Areas in Communications, 24(2), 221–232.

    Article  Google Scholar 

  6. Carman, D. W., Kruus, P. S., & Matt, B. J. (2000, September). Constraints and approaches for distributed sensor network security. NAI labs technical report.

  7. Chan, H., Perrig, A., & Song, D. (2003, May). Random key pre-distribution schemes for sensor network. In Proceedings of IEEE symposium on security and privacy’03, pp. 197–213.

  8. Chan, H., Gligor, V. D., Perrig, A., & Muralidharan, G. (2005). On the distribution and revocation of cryptographic keys in sensor networks. IEEE Transactions on Dependable and Secure Computing, 2(3), 233–247.

    Article  Google Scholar 

  9. Chan, A. C. F. (2004, March). Distributed symmetric key management for mobile ad hoc networks. In Proceedings of IEEE INFOCOM’04, pp. 2414–2424.

  10. Chen, X., Makki, K., Yen, K., & Pissinou, N. (2009). Sensor network security: A survey. IEEE Communications Surveys and Tutorials, 11(2), 52–73.

    Article  Google Scholar 

  11. Diffie, W., & Hellman, M. E. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.

    Article  MATH  MathSciNet  Google Scholar 

  12. Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J., & Khalili, A. (2005). A pairwise key pre-distribution scheme for wireless sensor networks. ACM Transactions on Information and System Security, 8(2), 228–258.

    Article  Google Scholar 

  13. Eschenauer, L., & Gligor, V. D. (2002, November). A key management scheme for distributed sensor networks. In ACM conference on computer and communications security’02, pp. 41–47.

  14. Gandham, S. R., Dawande, M., Prakash, R., & Venkatesan, S. (2003). Energy efficient schemes for wireless sensor networks with multiple mobile base stations. In Proceedings of globecom’03, pp. 377–381.

  15. Goldreich, O. (2000). Foundations of cryptography: Basic tools. New York: Cambridge University Press.

    Google Scholar 

  16. Lazos, L., & Poovendran, R. (2004, October). Serloc: Secure range-independent localization for wireless sensor networks. In Proceedings of ACM international conference mobile computing and networking’04.

  17. Lee, J. C., Leung, V. C. M., Wong, K. H., Cao, J., & Chan, H. C. B. (2007). Key management issues in wireless sensor networks: Current proposals and future developments. IEEE Wireless Communications, 14(5), 76–84.

    Article  Google Scholar 

  18. Merkle, R. (1980, April). Protocols for public key cryptosystems. In Proceedings of IEEE symposium research in security and Privacy’80, pp. 122–134.

  19. Neuman, B. C., & Tso, T. (1994). Kerberos: An authentication service for computer networks. IEEE Communications Magazine, 32(9), 33–38.

    Article  Google Scholar 

  20. Oyman, E. I., & Ersoy, C. (2004). Multiple sink network design problem in large scale wireless sensor networks. In Proceedings of IEEE ICC’04, pp. 3663–3667.

  21. Pathak, V., Yao, D., & Iftode, L. (2008, September). Securing location aware services over VANET using geographical secure path routing. In Proceedings of IEEE ICVES’08, pp. 346–353.

  22. Perrig, A., Szewczyk, R., Wen, V., Cullar, D., & Tygar, J. D. (2001, July). SPINS: Security protocols for sensor networks. In Proceedings of ACM/IEEE international conference on mobile computing and networking’01, pp. 189–199.

  23. Peters, B., Smith, J., Medeiros, O., & Rohrer, M. (2001). ‘Improving simulation model adaptability with a production control framework. In Proceedings of simulation conference’01.

  24. Ren, K., Lou, W., & Zhang, Y. (2008). LEDS: Providing location-aware end-to-end data security in wireless sensor networks. IEEE Transactions on Mobile Computing, 7(5), 585–598.

    Article  Google Scholar 

  25. Rivest, R. L., Shamir, A., & Adleman, L. M. (1978). A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21(2), 120–126.

    Article  MATH  MathSciNet  Google Scholar 

  26. Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11), 612–613.

    Article  MATH  MathSciNet  Google Scholar 

  27. Wang, Y., Ramamurthy, B., & Xue, Y. (2008, May). A key management protocol for wireless sensor networks with multiple base stations. In Proceedings of ICC’08, pp. 1625–1629.

  28. Yang, H., Ye, F., Yuan, Y., Lu, S., & Arbaugh, W. (2005). Toward resilient security in wireless sensor networks. In Proceedings of ACM MobiHoc’05.

  29. Ye, F., Luo, H., Cheng, J., Lu, S., & Zhang, L. (2002, September). A two-tier data dissemination model for large-scale wireless sensor networks. In Proceedings of ACM MOBICOM’02.

  30. Ye, F., Luo, H., Lu, S., & Zhang, L. (2004, March). Statistical en-route filtering of injected false data in sensor networks. In Proceedings of IEEE INFOCOM’04.

  31. Ye, F., Lu, S., & Zhang, L. (2005). Gradient broadcast: A robust data delivery protocol for large scale sensor networks. Wireless Networks’, 05(11(3), 285–298.

    Article  Google Scholar 

  32. Zhang, Y., Liu, W., Fang, Y., & Wu, D. (2006). Secure localization and authentication in ultra-wideband sensor networks. IEEE J. Selected Areas Comm., 24(4), 829–835.

    Article  Google Scholar 

  33. Zhou, Y., Zhang, Y., & Fang, Y. (2008). Securing wireless sensor networks: a survey. IEEE Communications Surveys and Tutorials, 10(3), 6–28.

    Article  Google Scholar 

  34. Zhu, S., Setia, S., & Jajodia, S. (2003, October). LEAP: Efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of ACM conference on computer and communications security’03, pp. 62–72.

  35. Zhu, S., Setia, S., Jajodia, S., & Ning, P. (2004, May). An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In Proceedings of IEEE symposium security and privacy’04.

  36. Zhu, S., Setia, S., & Jajodia, S. (2006) LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks 2(4):500–528.

    Article  Google Scholar 

Download references

Acknowledgments

The work of H.W. Ferng was supported by the National Science Council (NSC), Taiwan under contracts NSC 101-2221-E-011-109 and NSC 102-2221-E-011-004.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Huei-Wen Ferng.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ferng, HW., Nurhakim, J. & Horng, SJ. Key management protocol with end-to-end data security and key revocation for a multi-BS wireless sensor network. Wireless Netw 20, 625–637 (2014). https://doi.org/10.1007/s11276-013-0627-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-013-0627-4

keywords

Navigation