Nothing Special   »   [go: up one dir, main page]

Skip to main content

Advertisement

Log in

An Efficient Pairwise and Group Key Management Protocol for Wireless Sensor Network

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Although security services depend on the key management system, they do not specify how to exchange keys securely. Many security-critical applications depend on key management processes to operate but also demand a high level of fault tolerance when a node is compromised. Due to constraints on wireless sensor networks (WSNs) traditional security mechanisms cannot be applied directly. Moreover, to be robust, the key management protocol should not only be lightweight but also should support both pairwise and group-wise communications. In this paper, we propose an efficient key management protocol for WSNs that provides support for both pairwise and group-wise key management. We have implemented our scheme in the TelosB mote and present some experimental results on computational, communication, energy and storage overheads. We compared the performance with other symmetric and public key based key management protocols used in WSNs. The results show our protocol is efficient in terms of computation, communication and energy overhead. It can update both pairwise and group keys to support key revocation, key refresh and new node addition.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Agarwal, R., Martinez-Catala, R. V., Harte, S., Segard, C., & O’Flynn, B. (2008). Modeling power in multi-functionality sensor network applications. In Second international conference on sensor technologies and applications, 2008. SENSORCOMM ’08 (pp. 507–512).

  2. Blom, R. (1985). An optimal class of symmetric key generation systems. In Proceedings of the EUROCRYPT 84 workshop on advances in cryptology: Theory and application of cryptographic techniques (pp. 335–338). New York, NY, USA: Springer-Verlag New York Inc.

  3. Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., & Yung, M. (1993). Perfectly-secure key distribution for dynamic conferences. In CRYPTO ’92: Proceedings of the 12th annual international cryptology conference on advances in cryptology (pp. 471–486). London, UK: Springer-Verlag.

  4. Boujelben, M., Youssef, H., & Abid, M. (2008). An efficient scheme for key pre-distribution in wireless sensor networks. In IEEE international conference on wireless and mobile computing, networking and communication (pp. 532–537).

  5. Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. In Proceedings of 2003 symposium on security and privacy (pp. 197–213, 11–14).

  6. Du, W., Deng, J., Han, Y. S., Chen, S., & Varshney, P. K. (2004). A key management scheme for wireless sensor networks using deployment knowledge. In INFOCOM 2004. Twenty-third AnnualJoint conference of the IEEE computer and communications societies (Vol. 1, pp. -597).

  7. Eriksson, J., Krishnamurthy, S. V., & Faloutsos, M. (2006). Truelink: A practical countermeasure to the wormhole attack in wireless networks. In Proceedings of the 2006 14th IEEE international conference on network protocols, 2006. ICNP ’06 (pp. 75–84).

  8. Eschenauer, L., & Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In CCS ’02: Proceedings of the 9th ACM conference on computer and communications security (pp. 41–47), New York, NY, USA, ACM.

  9. Heinzelman, W. R., Chandrakasan, A., & Balakrishnan, H. (2000). Energy-efficient communication protocol for wireless microsensor networks. In Proceedings of the 33rd annual Hawaii international conference on system sciences, 2000 ( Vol. 2, p. 10).

  10. Hu, Y.-C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: a defense against wormhole attacks in wireless networks. In INFOCOM 2003. Twenty-second annual joint conference of the IEEE computer and communications. IEEE Societies (Vol. 3, pp. 1976–1986).

  11. Hussain, S., Kausar, F., & Masood, A. (2007). An efficient key distribution scheme for heterogeneous sensor networks. In Proceedings of the 2007 international conference on wireless communications and mobile computing, IWCMC ’07, (pp. 388–392), New York, NY, USA, 2007. ACM.

  12. Karlof, C., Sastry, N., & Wagner, D. (2004). Tinysec: a link layer security architecture for wireless sensor networks. In Proceedings of the 2nd international conference on embedded networked sensor systems, SenSys ’04, (pp. 162–175), New York, NY, USA, 2004. ACM.

  13. Karlsson, J., Dooley, L. S., & Pulkkis, G. (2011). A new manet wormhole detection algorithm based on traversal time and hop count analysis. Sensors, 11(12), 11122–11140.

    Article  Google Scholar 

  14. Levis, P., Madden, S., Polastre, J., Szewczyk, R., Woo, A., Gay, D., et al. (2004). Tinyos: An operating system for sensor networks. In in ambient intelligence. Berlin: Springer.

    Google Scholar 

  15. Liu, A., & Ning, P. (2008). Tinyecc: A configurable library for elliptic curve cryptography in wireless sensor networks. In International conference on information processing in sensor networks, 2008. IPSN ’08 (pp. 245–256).

  16. Liu, D., & Ning, P. (2003). Location-based pairwise key establishments for static sensor networks. In Proceedings of the 1st ACM workshop on security of ad hoc and sensor networks, SASN ’03 (pp. 72–82). New York, NY, USA, 2003. ACM.

  17. MacWilliams, F. J., & Sloane, N. J. A. (1988). The theory of error-correcting codes (North-Holland Mathematical Library). North Holland Publishing Company.

  18. Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on mobile computing and networking, MobiCom ’00 (pp. 255–265). New York, NY, USA, 2000. ACM.

  19. Panja, B., Madria, S. K., & Bhargava, B. (2006). Energy and communication efficient group key management protocol for hierarchical sensor networks. In IEEE international conference on sensor networks, ubiquitous, and trustworthy computing, 2006 (Vol. 1, p. 8).

  20. Polastre, J., Hill, J., & Culler, D. (2004). Versatile low power media access for wireless sensor networks. In Proceedings of the 2nd international conference on embedded networked sensor systems, SenSys ’04 (pp. 95–107). New York, NY, USA, 2004. ACM.

  21. Prayati, A., Antonopoulos, Ch., Stoyanova, T., Koulamas, C., & Papadopoulos, G. (2010). A modeling approach on the telosb wsn platform power consumption. Journal of Systems and Software, 83(8), 1355–1363.

    Article  Google Scholar 

  22. Puttini, Ricardo, Hanashiro, Mara, Miziara, Fbio, de Sousa, Rafael, Javier Garca-Villalba, L., & Barenco, C. J. (2006). On the anomaly intrusion-detection in mobile ad hoc network environments. In Pedro Cuenca & Luiz Orozco-Barbosa (Eds.), Personal wireless communications (Vol. 4217, pp. 182–193)., Lecture notes in computer science Berlin: Springer.

    Chapter  Google Scholar 

  23. Riaz, R., Naureen, A., Akram, A., Akbar, A. H., Kim, K.-H., & Ahmed, H. F. (2008). A unified security framework with three key management schemes for wireless sensor networks. Computer Communications, 31(18), 4269–4280. (Secure multi-mode systems and their applications for pervasive computing).

    Article  Google Scholar 

  24. Sen, S., & Clark, J. A. (2011). Evolutionary computation techniques for intrusion detection in mobile ad hoc networks. Computer Networks, 55(15), 3441–3457.

    Article  Google Scholar 

  25. Shih, E., Cho, S.-H., Ickes, N., Min, R., Sinha, A., Wang, A., & Chandrakasan, A. (2001). Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks. In Proceedings of the 7th annual international conference on mobile computing and networking, MobiCom ’01 (pp. 272–287). New York, NY, USA, ACM.

  26. TelosB data sheet. (2014). Crossbow technology Inc. Accessed September 20, 2014, http://www.xbow.com/

  27. Traynor, P., Kumar, R., Bin Saad, H., Cao, G., & La Porta, T. (2006). Liger: Implementing efficient hybrid security mechanisms for heterogeneous sensor networks. In P. Gunningberg, L. Larzon, M. Satyanarayanan & N. Davies (Eds), ACM/USENIX fourth international conference on mobile systems applications and services (MobiSys) (pp. 15–27). ACM press.

  28. Wang, H., & Li, Q. (2006). Efficient implementation of public key cryptosystems on mote sensors (short paper). In Proceedings of the 8th international conference on information and communications security, ICICS’06 (pp. 519–528). Berlin, Heidelberg, Springer.

  29. Wen, M., Zheng, Y.-F., Ye, W.-J., Chen, K.-F., & Qiu, W.-D. (2009). A key management protocol with robust continuity for sensor networks. Computer Standards and Interfaces, 31(4), 642–647.

    Article  Google Scholar 

  30. Yang, M. L., Al-Anbuky, A., & Liu, W. (2012). A fast and efficient key agreement scheme for wireless sensor networks. In ICWMC 2012, The eighth international conference on wireless and mobile communications (pp. 231–237). Venice: ThinkMind.

  31. Al-Anbuky, A., & Liu, W. (2014). An authenticated key agreement scheme for wireless sensor networks. Journal of Sensor and Actuator Networks, 3(3), 181–206.

    Article  Google Scholar 

  32. Younis, M. F., Ghumman, K., & Eltoweissy, M. (2006). Location-aware combinatorial key management scheme for clustered sensor networks. IEEE Transactions on Parallel and Distributed Systems, 17(18), 865–882.

    Article  Google Scholar 

  33. Zhu, S., Setia, S., & Jajodia, S. (2003). Leap: efficient security mechanisms for large-scale distributed sensor networks. In CCS ’03: Proceedings of the 10th ACM conference on computer and communications security (pp. 62–72). New York, NY, USA, ACM.

  34. Zhu, S., Xu, S., Setia, S., & Jajodia, S. (2003). Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach. In Proceedings of the 11th IEEE international conference on network protocols, ICNP ’03 (p. 326) Washington, DC, USA, IEEE Computer Society.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Musfiq Rahman.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rahman, M., Sampalli, S. An Efficient Pairwise and Group Key Management Protocol for Wireless Sensor Network. Wireless Pers Commun 84, 2035–2053 (2015). https://doi.org/10.1007/s11277-015-2546-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-2546-4

Keywords

Navigation