Skip to main content
Erschienen in: Wireless Networks 4/2020

20.03.2019

DSKMS: a dynamic smart key management system based on fuzzy logic in wireless sensor networks

verfasst von: Mohammad Sadegh Yousefpoor, Hamid Barati

Erschienen in: Wireless Networks | Ausgabe 4/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Wireless sensor networks include a large number of sensor nodes which are developed in an environment. These networks have military, commercial, industrial, and medical applications. Providing these networks with security is of absolute importance. One strategy for maintaining the security of these networks is key management. In the presented paper, we propose a smart dynamic key management system for wireless sensor networks which utilizes fuzzy logic for path key generation and for adding new nodes to the network. Our proposed key management system falls in the category of methods which are based on hierarchical networks and it utilizes both pre-distribution and post-deployment mechanisms of key distribution among the sensor nodes. Utilization of fuzzy logic in the proposed key management system results in increased accuracy in decision making and contributes to its smartification. As a result, energy consumption in the network is reduced and the network lifetime is enhanced. Simulation results show that our system, compared to other key management systems, is more efficient in terms of communication overload, required memory space, and energy consumption. Furthermore, our system demonstrated proper resilience and resistance to cryptanalysis attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Qiu, T., Chen, N., Li, K., Qiao, D., & Fu, Z. (2017). Heterogeneous ad hoc networks: Architectures, advances and challenges. Ad Hoc Networks, 55, 143–152.CrossRef Qiu, T., Chen, N., Li, K., Qiao, D., & Fu, Z. (2017). Heterogeneous ad hoc networks: Architectures, advances and challenges. Ad Hoc Networks, 55, 143–152.CrossRef
2.
Zurück zum Zitat Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of things security: A survey. Journal of Network and Computer Applications, 88, 10–28.CrossRef Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of things security: A survey. Journal of Network and Computer Applications, 88, 10–28.CrossRef
3.
Zurück zum Zitat Afsar, M. M., Tayarani, N., & Mohammad, H. (2014). Clustering in sensor networks: A literature survey. Journal of Network and Computer Applications, 46, 198–226.CrossRef Afsar, M. M., Tayarani, N., & Mohammad, H. (2014). Clustering in sensor networks: A literature survey. Journal of Network and Computer Applications, 46, 198–226.CrossRef
4.
Zurück zum Zitat Jawad, H., Nordin, R., Gharghan, S., Jawad, A., & Ismail, M. (2017). Energy-efficient wireless sensor networks for precision agriculture: A review. Sensors, 17(8), 1781.CrossRef Jawad, H., Nordin, R., Gharghan, S., Jawad, A., & Ismail, M. (2017). Energy-efficient wireless sensor networks for precision agriculture: A review. Sensors, 17(8), 1781.CrossRef
5.
Zurück zum Zitat Annapurna, H. S., & Siddappa, M. (2015). A technique for multi-tier key distribution for securing group communication in WSN, emerging research in computing, information. Communication and Applications, 273–279. Annapurna, H. S., & Siddappa, M. (2015). A technique for multi-tier key distribution for securing group communication in WSN, emerging research in computing, information. Communication and Applications, 273–279.
6.
Zurück zum Zitat Bhushan, B., & Sahoo, G. (2018). Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks. Wireless Personal Communications, 98(2), 2037–2077.CrossRef Bhushan, B., & Sahoo, G. (2018). Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks. Wireless Personal Communications, 98(2), 2037–2077.CrossRef
7.
Zurück zum Zitat Yang, K. (2014). Wireless sensor networks, principles, design and applications (pp. 187–215). London: Springer. Yang, K. (2014). Wireless sensor networks, principles, design and applications (pp. 187–215). London: Springer.
8.
Zurück zum Zitat Chen, L. (2013). Wireless network security (pp. 129–221). Beijing: Springer.CrossRef Chen, L. (2013). Wireless network security (pp. 129–221). Beijing: Springer.CrossRef
9.
Zurück zum Zitat Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in internet-of-things. IEEE Internet of Things Journal, 4(5), 1250–1258.CrossRef Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in internet-of-things. IEEE Internet of Things Journal, 4(5), 1250–1258.CrossRef
10.
Zurück zum Zitat El-Bendary, M. (2015). AM and others, developing security tools of WSN and WBAN networks applications (pp. 79–95). Tokyo: Springer. El-Bendary, M. (2015). AM and others, developing security tools of WSN and WBAN networks applications (pp. 79–95). Tokyo: Springer.
11.
Zurück zum Zitat Yang, G. C., Ao, S. L. G., & An, L. (2015). IAENG transactions on engineering technologies (pp. 615–628). London: Springer.CrossRef Yang, G. C., Ao, S. L. G., & An, L. (2015). IAENG transactions on engineering technologies (pp. 615–628). London: Springer.CrossRef
12.
Zurück zum Zitat Wang, Y., & Zhao, J. (2017). Key management scheme for wireless sensor networks. In International wireless internet conference (pp. 272–283). Cham: Springer. Wang, Y., & Zhao, J. (2017). Key management scheme for wireless sensor networks. In International wireless internet conference (pp. 272–283). Cham: Springer.
13.
Zurück zum Zitat Huang, J.-M., Yang, S.-B., & Dai, C.-L. (2013). An efficient key management scheme for data-centric storage wireless sensor networks. IERI Procedia, 4, 25–31.CrossRef Huang, J.-M., Yang, S.-B., & Dai, C.-L. (2013). An efficient key management scheme for data-centric storage wireless sensor networks. IERI Procedia, 4, 25–31.CrossRef
14.
Zurück zum Zitat Yousefpoor, M. S., & Barati, H. (2019). Dynamic key management algorithms in wireless sensor networks: A survey. Computer Communications, 134, 52–69.CrossRef Yousefpoor, M. S., & Barati, H. (2019). Dynamic key management algorithms in wireless sensor networks: A survey. Computer Communications, 134, 52–69.CrossRef
15.
Zurück zum Zitat Kodali, R. K. & Chougule, S. (2013). Hybrid key management technique for WSNs. In International conference on heterogeneous networking for quality, reliability, security and robustness (pp. 854–865). Kodali, R. K. & Chougule, S. (2013). Hybrid key management technique for WSNs. In International conference on heterogeneous networking for quality, reliability, security and robustness (pp. 854–865).
16.
Zurück zum Zitat Thevar, G. K. C., & Rohini, G. (2017). Energy efficient geographical key management scheme for authentication in mobile wireless sensor networks. Wireless Networks, 23(5), 1479–1489.CrossRef Thevar, G. K. C., & Rohini, G. (2017). Energy efficient geographical key management scheme for authentication in mobile wireless sensor networks. Wireless Networks, 23(5), 1479–1489.CrossRef
17.
Zurück zum Zitat Bekara, C., Laurent-Maknavicius, M. (2009). Wireless and mobile network security (pp. 613–648). France: Wiley.CrossRef Bekara, C., Laurent-Maknavicius, M. (2009). Wireless and mobile network security (pp. 613–648). France: Wiley.CrossRef
18.
Zurück zum Zitat Hassanien, A. E., Kim, T. H., Kacprzyk, J., & Awad, A. (2014). Bio-inspiring cyber security and cloud services: Trends and innovations. New York: Springer.CrossRef Hassanien, A. E., Kim, T. H., Kacprzyk, J., & Awad, A. (2014). Bio-inspiring cyber security and cloud services: Trends and innovations. New York: Springer.CrossRef
19.
Zurück zum Zitat Zhang, Y., Li, X., Liu, J., Yang, J., & Cui, B. (2012). A secure hierarchical key management scheme in wireless sensor network. International Journal of Distributed Sensor Networks, 8(9), 547471.CrossRef Zhang, Y., Li, X., Liu, J., Yang, J., & Cui, B. (2012). A secure hierarchical key management scheme in wireless sensor network. International Journal of Distributed Sensor Networks, 8(9), 547471.CrossRef
20.
Zurück zum Zitat Zhu, S., Setia, S., & Jajodia, S. (2006). LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks (TOSN), 2(4), 500–528.CrossRef Zhu, S., Setia, S., & Jajodia, S. (2006). LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Transactions on Sensor Networks (TOSN), 2(4), 500–528.CrossRef
21.
Zurück zum Zitat Messai, M. L., Seba, H., & Aliouat, M. (2015). A new hierarchical key management scheme for secure clustering in wireless sensor networks. In International conference on wired/wireless internet communication (pp. 411–424). Messai, M. L., Seba, H., & Aliouat, M. (2015). A new hierarchical key management scheme for secure clustering in wireless sensor networks. In International conference on wired/wireless internet communication (pp. 411–424).
22.
Zurück zum Zitat Ahlawat, P., & Dave, M. (2018). An attack model based highly secure key management scheme for wireless sensor networks. Procedia Computer Science, 125, 201–207.CrossRef Ahlawat, P., & Dave, M. (2018). An attack model based highly secure key management scheme for wireless sensor networks. Procedia Computer Science, 125, 201–207.CrossRef
23.
Zurück zum Zitat Aissani, S., Omar, M., Tari, A., & Bouakkaz, F. (2018). \(\mu\)KMS: Micro key management system for WSNs. IET Wireless Sensor Systems, 8(2), 87–97.CrossRef Aissani, S., Omar, M., Tari, A., & Bouakkaz, F. (2018). \(\mu\)KMS: Micro key management system for WSNs. IET Wireless Sensor Systems, 8(2), 87–97.CrossRef
24.
Zurück zum Zitat Seo, S.-H., Won, J., Sultana, S., & Bertino, E. (2015). Effective key management in dynamic wireless sensor networks. IEEE Transactions on Information Forensics and Security, 10(2), 371–383.CrossRef Seo, S.-H., Won, J., Sultana, S., & Bertino, E. (2015). Effective key management in dynamic wireless sensor networks. IEEE Transactions on Information Forensics and Security, 10(2), 371–383.CrossRef
25.
Zurück zum Zitat Blom, R. (1984). An optimal class of symmetric key generation systems. In Workshop on the theory and application of of cryptographic techniques (Vol. 209, pp. 335–338). Blom, R. (1984). An optimal class of symmetric key generation systems. In Workshop on the theory and application of of cryptographic techniques (Vol. 209, pp. 335–338).
26.
Zurück zum Zitat Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., & Yung, M. (1992). Perfectly-secure key distribution for dynamic conferences. Annual international cryptology conference (pp. 471–486). Blundo, C., De Santis, A., Herzberg, A., Kutten, S., Vaccaro, U., & Yung, M. (1992). Perfectly-secure key distribution for dynamic conferences. Annual international cryptology conference (pp. 471–486).
27.
Zurück zum Zitat Rahman, M., & Sampalli, S. (2015). An efficient pairwise and group key management protocol for wireless sensor network. Wireless Personal Communications, 84(3), 2035–2053.CrossRef Rahman, M., & Sampalli, S. (2015). An efficient pairwise and group key management protocol for wireless sensor network. Wireless Personal Communications, 84(3), 2035–2053.CrossRef
28.
Zurück zum Zitat Erfani, S. H., Javadi, H. H. S., & Rahmani, A. M. (2015). A dynamic key management scheme for dynamic wireless sensor networks. Security and Communication Networks, 8(6), 1040–1049.CrossRef Erfani, S. H., Javadi, H. H. S., & Rahmani, A. M. (2015). A dynamic key management scheme for dynamic wireless sensor networks. Security and Communication Networks, 8(6), 1040–1049.CrossRef
29.
Zurück zum Zitat Hosen, A. S. M. S., & Cho, G. H. (2014). A robust key management scheme based on node hierarchy for wireless sensor networks. In International conference on computational science and its applications (pp. 315–329). Hosen, A. S. M. S., & Cho, G. H. (2014). A robust key management scheme based on node hierarchy for wireless sensor networks. In International conference on computational science and its applications (pp. 315–329).
30.
Zurück zum Zitat Siddique, N., & Adeli, H. (2013). Computational intelligence: Synergies of fuzzy logic, neural networks and evolutionary computing. London: Wiley.CrossRef Siddique, N., & Adeli, H. (2013). Computational intelligence: Synergies of fuzzy logic, neural networks and evolutionary computing. London: Wiley.CrossRef
31.
Zurück zum Zitat De Silva, C. W. (2018). Intelligent control: Fuzzy logic applications. Boca Raton: CRC Press. De Silva, C. W. (2018). Intelligent control: Fuzzy logic applications. Boca Raton: CRC Press.
32.
Zurück zum Zitat Cayirci, E., & Rong, C. (2009). Security in wireless ad hoc and sensor networks (pp. 121–141). Norwey: Wiley.CrossRef Cayirci, E., & Rong, C. (2009). Security in wireless ad hoc and sensor networks (pp. 121–141). Norwey: Wiley.CrossRef
33.
Zurück zum Zitat Rathore, H. (2016). Case study: A review of security challenges, attacks and trust and reputation models in wireless sensor networks, mapping biological systems to network systems (pp. 117–175). Zurich: Springer. Rathore, H. (2016). Case study: A review of security challenges, attacks and trust and reputation models in wireless sensor networks, mapping biological systems to network systems (pp. 117–175). Zurich: Springer.
34.
Zurück zum Zitat Delfs, H., Knebl, H., & Knebl, H. (2015). Introduction to cryptography (pp. 1–483). Berlin: Springer.MATH Delfs, H., Knebl, H., & Knebl, H. (2015). Introduction to cryptography (pp. 1–483). Berlin: Springer.MATH
35.
Zurück zum Zitat Boyle, D. E., & Newe, T. (2009). On the implementation and evaluation of an elliptic curve based cryptosystem for Java enabled wireless sensor networks. Sensors and Actuators A: Physical, 156(2), 394–405.CrossRef Boyle, D. E., & Newe, T. (2009). On the implementation and evaluation of an elliptic curve based cryptosystem for Java enabled wireless sensor networks. Sensors and Actuators A: Physical, 156(2), 394–405.CrossRef
36.
Zurück zum Zitat Sahingoz, O. K. (2013). Large scale wireless sensor networks with multi-level dynamic key management scheme. Journal of Systems Architecture, 59(9), 801–807.CrossRef Sahingoz, O. K. (2013). Large scale wireless sensor networks with multi-level dynamic key management scheme. Journal of Systems Architecture, 59(9), 801–807.CrossRef
37.
Zurück zum Zitat Oreku, G. S., & Pazynyuk, T. (2016). Security in wireless sensor networks (pp. 1–87). Zurich: Springer.CrossRef Oreku, G. S., & Pazynyuk, T. (2016). Security in wireless sensor networks (pp. 1–87). Zurich: Springer.CrossRef
38.
Zurück zum Zitat He, X., Niedermeier, M., & De Meer, H. (2013). Dynamic key management in wireless sensor networks: A survey. Journal of Network and Computer Applications, 36(2), 611–622.CrossRef He, X., Niedermeier, M., & De Meer, H. (2013). Dynamic key management in wireless sensor networks: A survey. Journal of Network and Computer Applications, 36(2), 611–622.CrossRef
39.
Zurück zum Zitat Ferng, H.-W., Nurhakim, J., & Horng, S.-J. (2014). Key management protocol with end-to-end data security and key revocation for a multi-BS wireless sensor network. Wireless Networks, 20(4), 625–637.CrossRef Ferng, H.-W., Nurhakim, J., & Horng, S.-J. (2014). Key management protocol with end-to-end data security and key revocation for a multi-BS wireless sensor network. Wireless Networks, 20(4), 625–637.CrossRef
40.
Zurück zum Zitat Azzabi, T., Farhat, H., & Sahli, N. (2017). A survey on wireless sensor networks security issues and military specificities, In International conference on IEEE, advanced systems and electric technologies (IC\_ASET) (pp. 66–72). Azzabi, T., Farhat, H., & Sahli, N. (2017). A survey on wireless sensor networks security issues and military specificities, In International conference on IEEE, advanced systems and electric technologies (IC\_ASET) (pp. 66–72).
41.
Zurück zum Zitat Rezai, A., Keshavarzi, P., & Moravej, Z. (2017). Key management issue in SCADA networks: A review. Engineering Science and Technology, An International Journal, 20(1), 354–363.CrossRef Rezai, A., Keshavarzi, P., & Moravej, Z. (2017). Key management issue in SCADA networks: A review. Engineering Science and Technology, An International Journal, 20(1), 354–363.CrossRef
42.
Zurück zum Zitat Yaqoob, I., Ahmed, E., Hashem, I. A. T., Ahmed, A. I. A., Gani, A., Imran, M., et al. (2017). Internet of things architecture: Recent advances, taxonomy, requirements, and open challenges. IEEE Wireless Communications, 24(3), 10–16.CrossRef Yaqoob, I., Ahmed, E., Hashem, I. A. T., Ahmed, A. I. A., Gani, A., Imran, M., et al. (2017). Internet of things architecture: Recent advances, taxonomy, requirements, and open challenges. IEEE Wireless Communications, 24(3), 10–16.CrossRef
Metadaten
Titel
DSKMS: a dynamic smart key management system based on fuzzy logic in wireless sensor networks
verfasst von
Mohammad Sadegh Yousefpoor
Hamid Barati
Publikationsdatum
20.03.2019
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 4/2020
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-019-01980-1

Weitere Artikel der Ausgabe 4/2020

Wireless Networks 4/2020 Zur Ausgabe

Neuer Inhalt