Skip to main content
Erschienen in: Wireless Personal Communications 3/2019

02.05.2019

A Light Weight Secure Communication Scheme for Wireless Sensor Networks

verfasst von: R. Geetha, V. Madhusudhan, T. Padmavathy, A. Lallithasree

Erschienen in: Wireless Personal Communications | Ausgabe 3/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The majority of security systems for wireless sensor networks are based on symmetric encryption. The main open issue for these approaches concerns the establishment of symmetric keys. A promising key distribution technique is the random pre-distribution of secret keys. Despite its effectiveness, this approach presents considerable memory overheads, in contrast with the limited resources of wireless sensor networks. A new scheme, called Seed based Min–Max Composite (S2MC), is proposed that exploits the best features of random pre-distribution with lower memory requirements and higher resilience. The novelty of the S2MC scheme lies in the organization of the secret material that uses the limited number of light weight pre-distributed seeds in a certain range and generating keys from the seeds during communication. The simulative analysis demonstrates that the introduced approach provides a higher level of security in terms of resilience than the existing schemes since the keys are erased after communication in the presence of compromised nodes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Zhang, Z., Mehmood, A., Shu, L., Huo, Z., Zhang, Y., & Mukherjee, M. (2018). A survey on fault diagnosis in wireless sensor networks. IEEE Access, 6, 11349–11364.CrossRef Zhang, Z., Mehmood, A., Shu, L., Huo, Z., Zhang, Y., & Mukherjee, M. (2018). A survey on fault diagnosis in wireless sensor networks. IEEE Access, 6, 11349–11364.CrossRef
2.
Zurück zum Zitat Choi, J., Bang, J., Kim, L. H., Ahn, M., & Kwon, T. (2017). Location-based key management strong against insider threats in wireless sensor networks. IEEE Systems Journal, 11(2), 494–502.CrossRef Choi, J., Bang, J., Kim, L. H., Ahn, M., & Kwon, T. (2017). Location-based key management strong against insider threats in wireless sensor networks. IEEE Systems Journal, 11(2), 494–502.CrossRef
3.
Zurück zum Zitat Yousefpoor, M. S., & Barati, H. (2018). Dynamic key management algorithms in wireless sensor networks: A survey. Computer Communications, COMCOM 5796. Yousefpoor, M. S., & Barati, H. (2018). Dynamic key management algorithms in wireless sensor networks: A survey. Computer Communications, COMCOM 5796.
4.
Zurück zum Zitat Wazid, M., Das, A. K., & Vasilakos, A. V. (2018). Authenticated key management protocol for cloud-assisted body area sensor networks. Journal of Network and Computer Applications, YJNCA 2208. Wazid, M., Das, A. K., & Vasilakos, A. V. (2018). Authenticated key management protocol for cloud-assisted body area sensor networks. Journal of Network and Computer Applications, YJNCA 2208.
5.
Zurück zum Zitat Zhan, F., Yao, N., Gao, Z., & Tan, G. (2017). A novel key generation method for wireless sensor networks based on system of equations. Journal of Network and Computer Applications, 82, 114–127.CrossRef Zhan, F., Yao, N., Gao, Z., & Tan, G. (2017). A novel key generation method for wireless sensor networks based on system of equations. Journal of Network and Computer Applications, 82, 114–127.CrossRef
6.
Zurück zum Zitat Xu, M., & Liu, L. (2018). Sensevault: A three-tier framework for securing mobile underwater sensor networks. IEEE Transactions on Mobile Computing, 17(11), 2632–2645.CrossRef Xu, M., & Liu, L. (2018). Sensevault: A three-tier framework for securing mobile underwater sensor networks. IEEE Transactions on Mobile Computing, 17(11), 2632–2645.CrossRef
7.
Zurück zum Zitat Agrawal, S., & Das, M. L. (2017). Mutual healing enabled group-key distribution protocol in wireless sensor networks. Computer Communications, 112, 131–140.CrossRef Agrawal, S., & Das, M. L. (2017). Mutual healing enabled group-key distribution protocol in wireless sensor networks. Computer Communications, 112, 131–140.CrossRef
8.
Zurück zum Zitat Athmani, S., Bilami, A., & Boubiche, D. E. (2017). EDAK: An efficient dynamic authentication and key management mechanism for heterogeneous WSNs. Future Generation Computer Systems, FUTURE 3765. Athmani, S., Bilami, A., & Boubiche, D. E. (2017). EDAK: An efficient dynamic authentication and key management mechanism for heterogeneous WSNs. Future Generation Computer Systems, FUTURE 3765.
9.
Zurück zum Zitat Seo, S. H., Won, J., Sultana, S., & Bertino, E. (2015). Effective key management in dynamic wireless sensor networks. Information Forensics and Security, IEEE Transactions on, 10(2), 371–383.CrossRef Seo, S. H., Won, J., Sultana, S., & Bertino, E. (2015). Effective key management in dynamic wireless sensor networks. Information Forensics and Security, IEEE Transactions on, 10(2), 371–383.CrossRef
10.
Zurück zum Zitat Ahlawat, P., & Dave, M. (2018). An attack model based highly secure key management scheme for wireless sensor networks. Procedia Computer Science, 125, 201–207.CrossRef Ahlawat, P., & Dave, M. (2018). An attack model based highly secure key management scheme for wireless sensor networks. Procedia Computer Science, 125, 201–207.CrossRef
11.
Zurück zum Zitat Jiang, Q., Zeadally, S., Ma, J., & He, D. (2017). Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access, 5, 3376–3392.CrossRef Jiang, Q., Zeadally, S., Ma, J., & He, D. (2017). Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access, 5, 3376–3392.CrossRef
12.
Zurück zum Zitat Al-Turjman, F., Ever, Y. K., Ever, E., Nguyen, H. X., & David, D. B. (2017). Seamless key agreement framework for mobile-sink in IoT based cloud-centric secured public safety sensor networks. IEEE Access, 5, 24617–24631.CrossRef Al-Turjman, F., Ever, Y. K., Ever, E., Nguyen, H. X., & David, D. B. (2017). Seamless key agreement framework for mobile-sink in IoT based cloud-centric secured public safety sensor networks. IEEE Access, 5, 24617–24631.CrossRef
13.
Zurück zum Zitat Omar, M., Belalouache, I., Amrane, S., & Abbache, B. (2018). Efficient and energy-aware key management framework for dynamic sensor networks. CAEE, 1–16. Omar, M., Belalouache, I., Amrane, S., & Abbache, B. (2018). Efficient and energy-aware key management framework for dynamic sensor networks. CAEE, 1–16.
14.
Zurück zum Zitat Anita, E. A. M., Geetha, R., & Kannan, E. (2015). A novel hybrid key management scheme for establishing secure communication in wireless sensor networks. Wireless Personal Communications, 82(3), 1419–1433.CrossRef Anita, E. A. M., Geetha, R., & Kannan, E. (2015). A novel hybrid key management scheme for establishing secure communication in wireless sensor networks. Wireless Personal Communications, 82(3), 1419–1433.CrossRef
15.
Zurück zum Zitat Bechkit, W., Challal, Y., Bouabdallah, A., & Tarokh, V. (2013). A highly scalable key pre-distribution scheme for wireless sensor networks. IEEE Transaction Wireless Communication, 12(2). Bechkit, W., Challal, Y., Bouabdallah, A., & Tarokh, V. (2013). A highly scalable key pre-distribution scheme for wireless sensor networks. IEEE Transaction Wireless Communication, 12(2).
16.
Zurück zum Zitat Eltoweissy, M., Moharrum, M., & Mukkamala, R. (2006). Dynamic key management in sensor networks. IEEE Communication Magazine, 44(4), 122–130.CrossRef Eltoweissy, M., Moharrum, M., & Mukkamala, R. (2006). Dynamic key management in sensor networks. IEEE Communication Magazine, 44(4), 122–130.CrossRef
17.
Zurück zum Zitat Gandino, F., Montrucchio, B., & Rebaudengo, M. (2014). Key management for static wireless sensor networks with node adding. IEEE Transaction on Industrial Informatics, 10(2), 1133–1143.CrossRef Gandino, F., Montrucchio, B., & Rebaudengo, M. (2014). Key management for static wireless sensor networks with node adding. IEEE Transaction on Industrial Informatics, 10(2), 1133–1143.CrossRef
18.
Zurück zum Zitat Guan, Z., & Yu, Y. (2008). A key management scheme using deployment knowledge for wireless sensor networks. IEEE Transaction on Parallel and Distribrituted System, 19(10), 1411–1425.CrossRef Guan, Z., & Yu, Y. (2008). A key management scheme using deployment knowledge for wireless sensor networks. IEEE Transaction on Parallel and Distribrituted System, 19(10), 1411–1425.CrossRef
19.
Zurück zum Zitat Hackmann, G., Guo, W., Yan, G., Sun, Z., Lu, C., & Dyke, S. (2014). Cyber-physical co-design of distributed structural health monitoring with wireless sensor networks. IEEE Transaction on Parallel and Distributed System, 25(1), 63–72.CrossRef Hackmann, G., Guo, W., Yan, G., Sun, Z., Lu, C., & Dyke, S. (2014). Cyber-physical co-design of distributed structural health monitoring with wireless sensor networks. IEEE Transaction on Parallel and Distributed System, 25(1), 63–72.CrossRef
20.
Zurück zum Zitat Kwon, T., Lee, J., & Song, J. (2009). Location-based pair-wise key pre-distribution for wireless sensor networks. IEEE Transaction on Wireless Communication, 8(11), 5436–5442.CrossRef Kwon, T., Lee, J., & Song, J. (2009). Location-based pair-wise key pre-distribution for wireless sensor networks. IEEE Transaction on Wireless Communication, 8(11), 5436–5442.CrossRef
21.
Zurück zum Zitat Seo, S. H., Won, J., Sultana, S., & Bertino, E. (2015). Effective key management in dynamic wireless sensor networks. IEEE Transaction on Information Forensics and Security, 10(2), 371–383.CrossRef Seo, S. H., Won, J., Sultana, S., & Bertino, E. (2015). Effective key management in dynamic wireless sensor networks. IEEE Transaction on Information Forensics and Security, 10(2), 371–383.CrossRef
22.
Zurück zum Zitat Du, W., Deng, J., Han, Y. S., & Varshney, P. K. (2006). A key pre-distribution scheme for sensor networks using deployment knowledge. IEEE Transactions on Dependable and Secure Computing, 3(1), 62–77.CrossRef Du, W., Deng, J., Han, Y. S., & Varshney, P. K. (2006). A key pre-distribution scheme for sensor networks using deployment knowledge. IEEE Transactions on Dependable and Secure Computing, 3(1), 62–77.CrossRef
23.
Zurück zum Zitat Yu, C. M., Sou, Y. T. T., Lu, C. S., & Kuo, S. Y. (2013). Localized algorithms for detection of node replication attacks in mobile sensor networks. IEEE Transaction on Information Forensics and Security, 8(5), 754–768.CrossRef Yu, C. M., Sou, Y. T. T., Lu, C. S., & Kuo, S. Y. (2013). Localized algorithms for detection of node replication attacks in mobile sensor networks. IEEE Transaction on Information Forensics and Security, 8(5), 754–768.CrossRef
24.
Zurück zum Zitat Yum, D., & Lee, P. J. (2012). Exact formulae for resilience in random key pre-distribution scheme. IEEE Transaction on Wireless Communication, 11(5), 1638–1642.CrossRef Yum, D., & Lee, P. J. (2012). Exact formulae for resilience in random key pre-distribution scheme. IEEE Transaction on Wireless Communication, 11(5), 1638–1642.CrossRef
25.
Zurück zum Zitat Rasheed, A., & Mahapatra, R. (2011). Keypredistribution schemes for establishing pairwise keys with a mobile sink in sensor networks. IEEE Transactions on Parallel and Distributed Systems, 22(1), 176–184.CrossRef Rasheed, A., & Mahapatra, R. (2011). Keypredistribution schemes for establishing pairwise keys with a mobile sink in sensor networks. IEEE Transactions on Parallel and Distributed Systems, 22(1), 176–184.CrossRef
26.
Zurück zum Zitat Das, A. K. (2011). An efficient random key distribution scheme for largescale distributed sensor networks. Security and Communication Networks, 4(2), 162–180.CrossRef Das, A. K. (2011). An efficient random key distribution scheme for largescale distributed sensor networks. Security and Communication Networks, 4(2), 162–180.CrossRef
27.
Zurück zum Zitat Zhu, S., Setia, S., & Jajodia, S. (2006). Leap+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks, 2(4), 500–528.CrossRef Zhu, S., Setia, S., & Jajodia, S. (2006). Leap+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks, 2(4), 500–528.CrossRef
Metadaten
Titel
A Light Weight Secure Communication Scheme for Wireless Sensor Networks
verfasst von
R. Geetha
V. Madhusudhan
T. Padmavathy
A. Lallithasree
Publikationsdatum
02.05.2019
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2019
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-019-06503-x

Weitere Artikel der Ausgabe 3/2019

Wireless Personal Communications 3/2019 Zur Ausgabe

Neuer Inhalt