Skip to main content
Erschienen in: Wireless Personal Communications 3/2015

01.06.2015

A Novel Hybrid Key Management Scheme for Establishing Secure Communication in Wireless Sensor Networks

verfasst von: E. A. Mary Anita, R. Geetha, E. Kannan

Erschienen in: Wireless Personal Communications | Ausgabe 3/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Security is a critical issue when sensor nodes are deployed in a hostile environment. This paper proposes a novel Polynomial based Q composite random scheme for the establishment of triple key among communicating nodes in a network. The proposed scheme combines the robustness of Q-Composite Key Generation Scheme with the Polynomial Pool-Based Schemethat enables a secure communication between wireless sensor nodes. The security analysis shows that our scheme assures a high probability of secure communication with a low communication overhead. The simulation results prove that our scheme performs better in terms of network resilience against node capture attacks with a high probability of connectivity. The proposed scheme shows an improvement in compromised data links between non compromised sensors.Our scheme also provides high resilience in terms of the fraction of unaffected communication links against the compromised nodes even in the presence of a large number of malicious nodes.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Huang, D., & Medhi, D. (2007). Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach. ACM Transactions on Sensor Networks, 3(3), 16:1–16:34. Huang, D., & Medhi, D. (2007). Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach. ACM Transactions on Sensor Networks, 3(3), 16:1–16:34.
2.
Zurück zum Zitat Zhu, S., Xu, S., Setia, S., & Jajodia, S. (2003). Establishing pairwise keys for secure communication in Ad Hoc networks: A probabilistic approach. In Proceedings of the 11th IEEE international conference network protocols, (pp. 326–335). IEEE Computer Society. Zhu, S., Xu, S., Setia, S., & Jajodia, S. (2003). Establishing pairwise keys for secure communication in Ad Hoc networks: A probabilistic approach. In Proceedings of the 11th IEEE international conference network protocols, (pp. 326–335). IEEE Computer Society.
3.
Zurück zum Zitat He, X., Niedermeier, M., & de Meer, H. (2013). Dynamic key management in wireless sensor networks: A survey. Journal of Network and Computer Applications, 36(2), 611–622.CrossRef He, X., Niedermeier, M., & de Meer, H. (2013). Dynamic key management in wireless sensor networks: A survey. Journal of Network and Computer Applications, 36(2), 611–622.CrossRef
4.
Zurück zum Zitat Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J., & Khalili, A. (2005). A pairwise key predistribution scheme for wireless sensor networks. ACM Transactions Information and System Security, 8(2), 228–258.CrossRef Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J., & Khalili, A. (2005). A pairwise key predistribution scheme for wireless sensor networks. ACM Transactions Information and System Security, 8(2), 228–258.CrossRef
5.
Zurück zum Zitat Traynor, P., Choi, H., Cao, G., Zhu, S., & Porta, T. L. (2006). Establishing pair-wise keys in heterogeneous sensor networks. In Proceedings of the 25th IEEE international conference on computer communications, (pp. 1–12). Spain. Traynor, P., Choi, H., Cao, G., Zhu, S., & Porta, T. L. (2006). Establishing pair-wise keys in heterogeneous sensor networks. In Proceedings of the 25th IEEE international conference on computer communications, (pp. 1–12). Spain.
6.
Zurück zum Zitat Blom, R. (1984). An optimal class of symmetric key generation systems. In Proceeding workshop advances in cryptology: Theory and application of cryptographic techniques. EUROCRYPT’84, (pp. 335–338). New York: Springer. Blom, R. (1984). An optimal class of symmetric key generation systems. In Proceeding workshop advances in cryptology: Theory and application of cryptographic techniques. EUROCRYPT’84, (pp. 335–338). New York: Springer.
7.
Zurück zum Zitat Blundo, C., Santis, A. D., Herzberg, A., Kutten, S., Vaccaro, U., & Yung, M. (1993). Perfectly-secure key distribution for dynamic conferences. In Lecture notes in computer science, (Vol. 740, pp. 471–486). Heidelberg: Springer. Blundo, C., Santis, A. D., Herzberg, A., Kutten, S., Vaccaro, U., & Yung, M. (1993). Perfectly-secure key distribution for dynamic conferences. In Lecture notes in computer science, (Vol. 740, pp. 471–486). Heidelberg: Springer.
8.
Zurück zum Zitat Eschenauer, L., & Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on computer and communications security, (pp. 41–47). New York. Eschenauer, L., & Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on computer and communications security, (pp. 41–47). New York.
9.
Zurück zum Zitat Chan, H., Perrig, A., & Song, D. (2003). Random key pre-distribution schemes for sensor networks. In Proceeding IEEE symposium security and privacy. Pittsburgh: Research showcase, Carnegie Mellon University. Chan, H., Perrig, A., & Song, D. (2003). Random key pre-distribution schemes for sensor networks. In Proceeding IEEE symposium security and privacy. Pittsburgh: Research showcase, Carnegie Mellon University.
10.
Zurück zum Zitat Rasheed, A., & Mahapatra, R. N. (2011). Key predistribution schemes for establishing pairwise keys with a mobile sink in sensor networks. IEEE Transactions on Parallel and Distributed Systems, 22(1), 176–184. Rasheed, A., & Mahapatra, R. N. (2011). Key predistribution schemes for establishing pairwise keys with a mobile sink in sensor networks. IEEE Transactions on Parallel and Distributed Systems, 22(1), 176–184.
11.
Zurück zum Zitat Liu, D., Ning, P., & Li, R. (2003). Establishing pairwise keys in distributed sensor networks. In Proceedings of the 10th ACM conference on computer and communications security, (pp. 52–61). New York. Liu, D., Ning, P., & Li, R. (2003). Establishing pairwise keys in distributed sensor networks. In Proceedings of the 10th ACM conference on computer and communications security, (pp. 52–61). New York.
12.
Zurück zum Zitat Ruj, S., Nayak, A., & Stojmenovic, I. (2013). Pairwise and triple key distribution in wireless sensor networks with applications. IEEE Transactions on Computers, 62(11), 2224–2237.CrossRefMathSciNet Ruj, S., Nayak, A., & Stojmenovic, I. (2013). Pairwise and triple key distribution in wireless sensor networks with applications. IEEE Transactions on Computers, 62(11), 2224–2237.CrossRefMathSciNet
13.
Zurück zum Zitat Lu, K., Qian, Y., Guizani, M., & Chen, H.-H. (2008). A framework for a distributed key management scheme in heterogeneous wireless sensor networks. IEEE Transactions on Wireless Communications, 7(2), 639–647. Lu, K., Qian, Y., Guizani, M., & Chen, H.-H. (2008). A framework for a distributed key management scheme in heterogeneous wireless sensor networks. IEEE Transactions on Wireless Communications, 7(2), 639–647.
14.
Zurück zum Zitat Chan, H., & Perrig, A. (2005). PIKE: Peer intermediaries for key establishment in sensor networks. In Proceeding IEEE INFO COM, (pp. 524–535). Miami. Chan, H., & Perrig, A. (2005). PIKE: Peer intermediaries for key establishment in sensor networks. In Proceeding IEEE INFO COM, (pp. 524–535). Miami.
Metadaten
Titel
A Novel Hybrid Key Management Scheme for Establishing Secure Communication in Wireless Sensor Networks
verfasst von
E. A. Mary Anita
R. Geetha
E. Kannan
Publikationsdatum
01.06.2015
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2015
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-2290-9

Weitere Artikel der Ausgabe 3/2015

Wireless Personal Communications 3/2015 Zur Ausgabe

Neuer Inhalt