Skip to main content
Top

2015 | OriginalPaper | Chapter

A Hierarchical Shared Key Algorithm in Wireless Sensor Networks

Authors : Zeyu Sun, Weiguo Wu, Xiaofei Xing, Chuanfeng Li, Yalin Nie, Yangjie Cao

Published in: Algorithms and Architectures for Parallel Processing

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Wireless sensor networks (WSNs) are often deployed in hostile environments, thus being subjected to great security risks. However, due to the influence of environment and dynamic topology, the communication radiuses of all nodes are not strictly consistent, which may cause different neighbor numbers and redundant neighbors for each central node. In this paper, we present a key agreement scheme without the trusted third parties by exploiting the special characteristics of Hopfield neural network: the two nodes converge in a steady state from their initial states respectively after iterating finite times, while maintaining the confidentiality of the key by quantifying the key to strings. Compared to existing solutions, the proposed method requires less memory and has lower communication overheads to key agreement.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ang, G., Wei, W., Zhixiao, W., Yan, W.: A hierarchical authentication scheme for the different radio ranges sensor network. In: 2009 International conference on Computational Science and Engineering, pp. 494–501 (2009) Ang, G., Wei, W., Zhixiao, W., Yan, W.: A hierarchical authentication scheme for the different radio ranges sensor network. In: 2009 International conference on Computational Science and Engineering, pp. 494–501 (2009)
2.
go back to reference Hailun, T., Sanjay, J., Diet, O., John, Z., Vijay, S.: Secure multi-hop network programming with multiple one-way key chains. In: Proceeding of the First ACM Conference on Wireless Network Security, pp. 206–211 (2008) Hailun, T., Sanjay, J., Diet, O., John, Z., Vijay, S.: Secure multi-hop network programming with multiple one-way key chains. In: Proceeding of the First ACM Conference on Wireless Network Security, pp. 206–211 (2008)
3.
go back to reference Ang, G., Wei, W., Zhi, W.: Hopfield-association: establishing a shared key in the wireless sensor networks. In: 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing, pp. 70–73 (2010) Ang, G., Wei, W., Zhi, W.: Hopfield-association: establishing a shared key in the wireless sensor networks. In: 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing, pp. 70–73 (2010)
4.
go back to reference Deng, J., Han, R., Mishra, S.: Defending against path-based dos attacks in wireless sensor networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 195–199 (2005) Deng, J., Han, R., Mishra, S.: Defending against path-based dos attacks in wireless sensor networks. In: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 195–199 (2005)
5.
go back to reference Deb, B., Bhatnagar, S., Nath, B.: ReInForM:Reliable information forwarding using multiple paths in sensor networks. In: 28th Annual IEEE Conference on Local Computer Networks, pp. 350–354 (2003) Deb, B., Bhatnagar, S., Nath, B.: ReInForM:Reliable information forwarding using multiple paths in sensor networks. In: 28th Annual IEEE Conference on Local Computer Networks, pp. 350–354 (2003)
6.
go back to reference Heinzelman, W.R., Chandrakasan, A., Balarkrishnan, H.: An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun. 1(4), 36–49 (2002)CrossRef Heinzelman, W.R., Chandrakasan, A., Balarkrishnan, H.: An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun. 1(4), 36–49 (2002)CrossRef
7.
go back to reference Chan, H., Perrig, A., Song, D.: Random Key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, pp. 56–67 (2003) Chan, H., Perrig, A., Song, D.: Random Key predistribution schemes for sensor networks. In: IEEE Symposium on Security and Privacy, pp. 56–67 (2003)
8.
go back to reference Suhas, M., Wade, T., Narayan, M., Chunxuna, Y., Alex, R.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of ACM MobiCom, pp. 236–242 (2008) Suhas, M., Wade, T., Narayan, M., Chunxuna, Y., Alex, R.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of ACM MobiCom, pp. 236–242 (2008)
9.
go back to reference Chang, C.C., Chang, Y.F.: Efficient anonymous auction protocol with freewheeling bids. Comput. Secur. 22(8), 728–734 (2003)CrossRef Chang, C.C., Chang, Y.F.: Efficient anonymous auction protocol with freewheeling bids. Comput. Secur. 22(8), 728–734 (2003)CrossRef
10.
go back to reference Jiang, R., Pan, L., Li, J.H.: An improvement on efficient anonymous auction protocols. Comput. Secur. 24(2), 169–174 (2005)CrossRef Jiang, R., Pan, L., Li, J.H.: An improvement on efficient anonymous auction protocols. Comput. Secur. 24(2), 169–174 (2005)CrossRef
11.
go back to reference Ye, F., Luo, H, Lu, S., Zhang, L.: Statistical route-filtering of injected false data in sensor networks. In: Proceeding IEEE INFOCOM, pp. 453–457 (2004) Ye, F., Luo, H, Lu, S., Zhang, L.: Statistical route-filtering of injected false data in sensor networks. In: Proceeding IEEE INFOCOM, pp. 453–457 (2004)
12.
go back to reference Hwang, M.S., Lu, J.L., Lin, C.: Adding timestamps to the electronic auction protocol. Data Knowl. Eng. 40(2), 155–162 (2002)CrossRefMATH Hwang, M.S., Lu, J.L., Lin, C.: Adding timestamps to the electronic auction protocol. Data Knowl. Eng. 40(2), 155–162 (2002)CrossRefMATH
13.
go back to reference Horng, T.L., Wen, S.J., Chi, K.L.: An electronic online bidding auction protocol with both security and efficiency. Appl. Math. Comput. 174(2), 1487–1497 (2006)MathSciNetCrossRefMATH Horng, T.L., Wen, S.J., Chi, K.L.: An electronic online bidding auction protocol with both security and efficiency. Appl. Math. Comput. 174(2), 1487–1497 (2006)MathSciNetCrossRefMATH
14.
go back to reference Neuman, B.C., Ts’o, T.: Kerberos: an authentication service for computer networks. IEEE Commun. 32(9), 126–135 (1994)CrossRef Neuman, B.C., Ts’o, T.: Kerberos: an authentication service for computer networks. IEEE Commun. 32(9), 126–135 (1994)CrossRef
15.
go back to reference Rivest, R.L., Shamir, A., Adleman, M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 489–499 (1982)MathSciNetMATH Rivest, R.L., Shamir, A., Adleman, M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 489–499 (1982)MathSciNetMATH
16.
go back to reference Housley, R., Hoffman, P.: Internet X.509 pubic key infrastructure operational protocols: FTP and HTTP. IEEE Commun. 203–227 (1999) Housley, R., Hoffman, P.: Internet X.509 pubic key infrastructure operational protocols: FTP and HTTP. IEEE Commun. 203–227 (1999)
17.
go back to reference Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik, A.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of ACM Mobicom 2008, pp. 522–530 (2008) Mathur, S., Trappe, W., Mandayam, N., Ye, C., Reznik, A.: Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In: Proceedings of ACM Mobicom 2008, pp. 522–530 (2008)
18.
go back to reference Xue, F., Kumar, P.R.: The number of neighbors needed for connectivity of wireless networks. Wirel. Netw. 10(2), 1254–1263 (2002) Xue, F., Kumar, P.R.: The number of neighbors needed for connectivity of wireless networks. Wirel. Netw. 10(2), 1254–1263 (2002)
19.
go back to reference Perrig, A., Szewczyk, V., Wen, D.C., Tygar, J.D.: SPINS: security protocols for sensor networks. J. Wirel. Netw. 8(5), 521–534 (2002)CrossRefMATH Perrig, A., Szewczyk, V., Wen, D.C., Tygar, J.D.: SPINS: security protocols for sensor networks. J. Wirel. Netw. 8(5), 521–534 (2002)CrossRefMATH
20.
go back to reference Savo, G.G.: Optimal Transmission Radius in Sensor Networks. Advanced Wireless Sensor Network: 4G Technologies, pp. 568–571. Wiley, New York (2006) Savo, G.G.: Optimal Transmission Radius in Sensor Networks. Advanced Wireless Sensor Network: 4G Technologies, pp. 568–571. Wiley, New York (2006)
21.
go back to reference Whit, D., Martin, H.: New directions in cryptography. IEEE Trans. Inf. Theor. 22(6), 962–977 (2010)MathSciNet Whit, D., Martin, H.: New directions in cryptography. IEEE Trans. Inf. Theor. 22(6), 962–977 (2010)MathSciNet
22.
go back to reference Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of ACM CCS 2002, pp. 520–523 (2002) Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of ACM CCS 2002, pp. 520–523 (2002)
23.
go back to reference Xu, Y., Heidemann, E.J.: Geography-informed energy conservation for ad hoc routing. In: Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, pp. 56–59 (2001) Xu, Y., Heidemann, E.J.: Geography-informed energy conservation for ad hoc routing. In: Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, pp. 56–59 (2001)
24.
go back to reference Liming, S., Guiming, G.: A survey on energy efficient protocols for wireless. Commun. China Comput. Fed. (CCF) 7(4), 13–16 (2002) Liming, S., Guiming, G.: A survey on energy efficient protocols for wireless. Commun. China Comput. Fed. (CCF) 7(4), 13–16 (2002)
Metadata
Title
A Hierarchical Shared Key Algorithm in Wireless Sensor Networks
Authors
Zeyu Sun
Weiguo Wu
Xiaofei Xing
Chuanfeng Li
Yalin Nie
Yangjie Cao
Copyright Year
2015
DOI
https://doi.org/10.1007/978-3-319-27161-3_36

Premium Partner